{ "type": "bundle", "id": "bundle--5aa7b639-62d8-46e6-be6c-4db8950d210f", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "name": "CIRCL", "identity_class": "organization" }, { "type": "grouping", "spec_version": "2.1", "id": "grouping--5aa7b639-62d8-46e6-be6c-4db8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "name": "OSINT - Gozi ISFB Remains Active in 2018, Leverages \"Dark Cloud\" Botnet For Distribution", "context": "suspicious-activity", "object_refs": [ "observed-data--5aa7b644-9558-4b2b-8deb-4e74950d210f", "url--5aa7b644-9558-4b2b-8deb-4e74950d210f", "x-misp-attribute--5aa7b657-db9c-47d7-a90d-42cb950d210f", "indicator--5aa7b6ea-f870-49de-abd4-4dd9950d210f", "indicator--5aa7b6ea-2404-442b-8b73-4f6e950d210f", "indicator--5aa7b6ea-76cc-45bc-aafa-4007950d210f", "indicator--5aa7b6ea-714c-4e23-a4bb-45f6950d210f", "indicator--5aa7b6ea-8148-4f2e-a8eb-4377950d210f", "indicator--5aa7b6ea-826c-4e96-a3de-40ea950d210f", "indicator--5aa7b6ea-1c70-4076-b9fa-4863950d210f", "indicator--5aa7b6ea-1948-4b18-a208-49d1950d210f", "indicator--5aa7b6ea-368c-4c37-b61d-4a93950d210f", "indicator--5aa7b6ea-c3ac-411a-a6ab-4f86950d210f", "indicator--5aa7b6ea-5518-4149-8a37-46bf950d210f", "indicator--5aa7b6ea-149c-45ef-87ab-4bd4950d210f", "indicator--5aa7b6ea-b544-43d5-8a8d-40f7950d210f", "indicator--5aa7b6ea-80e4-4da8-b5c4-4045950d210f", "indicator--5aa7b6ea-44b4-493d-8334-4127950d210f", "indicator--5aa7b6ea-0244-4b14-8499-47f1950d210f", "indicator--5aa7b6ea-9cac-481a-8908-4b15950d210f", "indicator--5aa7b6ea-4a38-48f4-8738-49aa950d210f", "indicator--5aa7b6ea-e054-4cc4-8229-4e39950d210f", "indicator--5aa7b6ea-7cb0-4347-927b-41db950d210f", "indicator--5aa7b6ea-07dc-4f64-bdf5-41a5950d210f", "indicator--5aa7b6ea-a62c-43c4-aeff-4bb6950d210f", "indicator--5aa7b6ea-66dc-4cec-b087-41eb950d210f", "indicator--5aa7b6ea-2020-4a5b-beda-4e9b950d210f", "indicator--5aa7b6ea-d4b4-4c4a-95de-4121950d210f", "indicator--5aa7b6ea-7df4-409a-bd84-48f8950d210f", "indicator--5aa7b6ea-4de0-478b-b15a-4aac950d210f", "indicator--5aa7b6ea-0ef4-452d-a826-47df950d210f", "indicator--5aa7b6ea-d06c-4ecc-b6eb-4e2c950d210f", "indicator--5aa7b6ea-7560-41fb-9140-4984950d210f", "indicator--5aa7b6ea-3610-4626-b558-47d4950d210f", "indicator--5aa7b6ea-08b8-46c8-97d0-43ba950d210f", "indicator--5aa7b6ea-9a88-4012-ac17-413a950d210f", "indicator--5aa7b6ea-4b34-47cf-a040-4d5e950d210f", "indicator--5aa7b6ea-e920-4a23-864b-44fd950d210f", "indicator--5aa7b6ea-93f0-492f-99ed-40af950d210f", "indicator--5aa7b6ea-26ec-4ccf-86d9-4671950d210f", "indicator--5aa7b6ea-c7f8-4bcf-b395-4013950d210f", "indicator--5aa7b6ea-6968-4622-a5f0-4764950d210f", "indicator--5aa7b6ea-06f0-40a4-8571-4d36950d210f", "indicator--5aa7b6ea-c930-4b44-ad5c-4c5f950d210f", "indicator--5aa7b6ea-658c-480a-a11a-42ac950d210f", "indicator--5aa7b6ea-182c-4d0c-89c7-4d03950d210f", "indicator--5aa7b6ea-ab8c-4a40-9178-417b950d210f", "indicator--5aa7b6ea-66c4-45fa-85b3-409f950d210f", "indicator--5aa7b6ea-f6a0-4f95-80f1-4fe4950d210f", "indicator--5aa7b6ea-9360-42ca-811d-4a7a950d210f", "indicator--5aa7b6ea-5280-40cd-ae93-4305950d210f", "indicator--5aa7b6ea-02c8-400a-8bad-4957950d210f", "indicator--5aa7b6ea-b5cc-4ae3-98d7-4776950d210f", "indicator--5aa7b6ea-5354-4329-98a4-4780950d210f", "indicator--5aa7b6ea-f1a4-4087-bea3-4ea4950d210f", "indicator--5aa7b6ea-9c10-471d-9443-40ce950d210f", "indicator--5aa7b6ea-4bf4-445f-b06a-4709950d210f", "indicator--5aa7b6ea-f6c4-4127-84d7-4481950d210f", "indicator--5aa7b6ea-a900-45bb-8db5-43b5950d210f", "indicator--5aa7b6ea-6564-4b4e-9457-4840950d210f", "indicator--5aa7b6ea-1228-4f85-b81a-4cca950d210f", "indicator--5aa7b6ea-c658-499f-9c7f-4639950d210f", "indicator--5aa7b6ea-76a0-4f0b-852b-447a950d210f", "indicator--5aa7b6ea-210c-4d26-9ba6-4f2e950d210f", "indicator--5aa7b6ea-d730-4148-8525-4584950d210f", "indicator--5aa7b6ea-86b0-4e44-9076-48e2950d210f", "indicator--5aa7b6ea-2884-49e3-82ee-4a65950d210f", "indicator--5aa7b6ea-c288-4e9f-8b61-4dbb950d210f", "indicator--5aa7b6ea-7e88-4de9-891a-49aa950d210f", "indicator--5aa7b6ea-20c0-4cb6-bfa1-40c5950d210f", "indicator--5aa7b6ea-a41c-4020-b632-489c950d210f", "indicator--5aa7b6ea-4d5c-4f2e-93b0-4093950d210f", "indicator--5aa7b6ea-df90-4f4f-9b4e-4a63950d210f", "indicator--5aa7b6ea-a4f0-4e81-8eec-4cca950d210f", "indicator--5aa7b6ea-4340-4791-aee9-4be1950d210f", "indicator--5aa7b6ea-0bc0-45ba-8b52-4403950d210f", "indicator--5aa7b6ea-d120-45d7-afb8-4446950d210f", "indicator--5aa7b6ea-8bf4-4e5b-a767-43d0950d210f", "indicator--5aa7b6ea-4218-4619-877d-4d3a950d210f", "indicator--5aa7b6ea-fbc0-4693-897d-4707950d210f", "indicator--5aa7b6ea-adfc-419d-8938-403a950d210f", "indicator--5aa7b6ea-3be4-4505-b752-414b950d210f", "indicator--5aa7b6ea-f140-4cb8-ac2c-4f23950d210f", "indicator--5aa7b6ea-8d38-4694-be68-425a950d210f", "indicator--5aa7b6ea-7d90-4226-866c-4f3f950d210f", "indicator--5aa7b6ea-52f4-4f1f-9b8b-4b42950d210f", "indicator--5aa7b6ea-3348-41fd-bcef-4281950d210f", "indicator--5aa7b6ea-59ec-4d83-81a7-4c2e950d210f", "indicator--5aa7b6ea-9224-4151-bd6c-45ee950d210f", "indicator--5aa7b6ea-d09c-431a-a9cd-4fcf950d210f", "indicator--5aa7b6ea-06e0-47e9-a955-4398950d210f", "indicator--5aa7b6ea-3f18-4b5f-8034-4cff950d210f", "indicator--5aa7b6ea-1b84-42e5-9a18-4a08950d210f", "indicator--5aa7b6ea-c208-4996-88e0-4f17950d210f", "indicator--5aa7b6ea-7700-482c-b0d8-47d7950d210f", "indicator--5aa7b6ea-1de8-473c-b68f-4e87950d210f", "indicator--5aa7b6ea-cb10-4724-b192-427b950d210f", "indicator--5aa7b6ea-7e78-4824-ad94-441b950d210f", "indicator--5aa7b6ea-35c8-49d2-ab37-49e6950d210f", "indicator--5aa7b6ea-04ec-4be5-ac44-4875950d210f", "indicator--5aa7b6ea-a468-461c-a765-4c07950d210f", "indicator--5aa7b6ea-48f8-4593-b032-4597950d210f", "indicator--5aa7b6ea-e6e4-4330-ba5e-45ff950d210f", "indicator--5aa7b6ea-9344-4470-ac4b-43ed950d210f", "indicator--5aa7b6ea-2a8c-4b72-ae25-4ec5950d210f", "indicator--5aa7b6ea-d23c-450d-ac23-4b07950d210f", "indicator--5aa7b6ea-7e9c-4adb-b5cf-4aca950d210f", "indicator--5aa7b6ea-2520-468f-8dd7-4b88950d210f", "indicator--5aa7b6ea-dc70-4aa9-aa01-4549950d210f", "indicator--5aa7b6ea-4f64-4203-9685-4875950d210f", "indicator--5aa7b6ea-d324-4d72-960c-482b950d210f", "indicator--5aa7b6ea-6170-481b-b9c1-4ad2950d210f", "indicator--5aa7b6ea-0024-473a-9229-4f4c950d210f", "indicator--5aa7b6ea-9dac-41d9-a065-493c950d210f", "indicator--5aa7b6ea-0b8c-4f2b-b3dd-45d4950d210f", "indicator--5aa7b6ea-9654-4488-a98d-4dbf950d210f", "indicator--5aa7b6ea-4f98-4153-87cb-4ba4950d210f", "indicator--5aa7b6ea-d998-4817-af13-43d0950d210f", "indicator--5aa7b6ea-92dc-4b7c-a3a9-4e94950d210f", "indicator--5aa7b6ea-4964-4b03-b190-4a5d950d210f", "indicator--5aa7b6ea-deb8-4262-b433-40b9950d210f", "indicator--5aa7b6ea-70ec-4d5e-a17c-43c0950d210f", "indicator--5aa7b6ea-251c-4484-8cad-4485950d210f", "indicator--5aa7b6ea-be58-47f9-878d-486d950d210f", "indicator--5aa7b6ea-6540-4c46-82f0-4d16950d210f", "indicator--5aa7b6ea-e388-4170-aa6b-41a7950d210f", "indicator--5aa7b6ea-7300-4e41-9200-48bc950d210f", "indicator--5aa7b6ea-1218-4524-8f7d-4005950d210f", "indicator--5aa7b6ea-b518-478d-aa5c-494b950d210f", "indicator--5aa7b6ea-5b38-45ff-8dbe-4ab4950d210f", "indicator--5aa7b6ea-fb18-4c6e-8ae7-4d8f950d210f", "indicator--5aa7b6ea-7708-4cc2-b7b9-4057950d210f", "indicator--5aa7b6ea-1a6c-4d06-b495-431e950d210f", "indicator--5aa7b6ea-8a40-4411-ad8e-457a950d210f", "indicator--5aa7b6ea-0f2c-4df5-8dde-4cf7950d210f", "indicator--5aa7b6ea-898c-4a7a-8b78-400f950d210f", "indicator--5aa7b6ea-0900-4552-9ef3-471a950d210f", "indicator--5aa7b6ea-8748-499b-94b6-4c18950d210f", "indicator--5aa7b6ea-29e4-4bab-b903-4a4c950d210f", "indicator--5aa7b6ea-a4a8-42dc-b522-40a8950d210f", "indicator--5aa7b6ea-4bf4-4765-b725-4d3a950d210f", "indicator--5aa7b6ea-4548-4c1f-80d7-432d950d210f", "indicator--5aa7b6ea-c458-48cd-85b2-4cfe950d210f", "indicator--5aa7b6ea-59ac-4841-a55e-45ca950d210f", "indicator--5aa7b6ea-e3ac-46fe-a8e7-4200950d210f", "indicator--5aa7b6ea-770c-4027-a091-4f65950d210f", "indicator--5aa7b6ea-2560-4b98-a78d-4145950d210f", "indicator--5aa7b6ea-b6cc-40fa-9f5a-47c3950d210f", "indicator--5aa7b6ea-4e78-43cd-bd3e-4d54950d210f", "indicator--5aa7b6ea-b6e0-410c-94b4-44a7950d210f", "indicator--5aa7b6ea-290c-4434-9b8b-4328950d210f", "indicator--5aa7b6ea-9c64-4320-b308-4873950d210f", "indicator--5aa7b6ea-d2a8-48f0-ad1c-4722950d210f", "indicator--5aa7b6ea-c42c-42d4-938b-4eea950d210f", "indicator--5aa7b6ea-866c-45d2-bde5-405c950d210f", "indicator--5aa7b6ea-4e88-4725-81c3-4e42950d210f", "indicator--5aa7b6ea-2b58-482e-9fde-4e61950d210f", "indicator--5aa7b6ea-eec4-4dd8-8db2-467b950d210f", "indicator--5aa7b6ea-c2fc-435a-a186-4bbf950d210f", "indicator--5aa7b6ea-6ef8-4d1e-8f32-49ab950d210f", "indicator--5aa7b6ea-0514-4fee-bf75-4108950d210f", "indicator--5aa7b6ea-b2a0-4437-9269-4361950d210f", "indicator--5aa7b6ea-4a4c-4bca-8b06-4d88950d210f", "indicator--5aa7b6ea-ddac-4c47-a376-4ee6950d210f", "indicator--5aa7b6ea-84f8-41bd-b764-4c25950d210f", "indicator--5aa7b6ea-1920-4bcc-b945-41ae950d210f", "indicator--5aa7b6ea-93e4-4947-99a5-4bea950d210f", "indicator--5aa7b6ea-1fd8-44de-b5ed-4e96950d210f", "indicator--5aa7b6ea-ba40-42e6-89ae-425d950d210f", "indicator--5aa7b6ea-4e04-40e4-ae9f-4a14950d210f", "indicator--5aa7b6ea-d9f8-4bd7-ae5a-4e27950d210f", "indicator--5aa7b6ea-7014-478a-a6d0-4862950d210f", "indicator--5aa7b6ea-fcd0-44a2-85ad-4790950d210f", "indicator--5aa7b6ea-8ab8-45a9-8e38-4331950d210f", "indicator--5aa7b6ea-0d4c-46e7-aeaf-4b1c950d210f", "indicator--5aa7b6ea-9bfc-4e2e-aa1a-4548950d210f", "indicator--5aa7b6ea-3344-4bbb-937a-43a9950d210f", "indicator--5aa7b6ea-c258-4cc5-9832-4006950d210f", "indicator--5aa7b6ea-57ac-41e7-a3ff-4614950d210f", "indicator--5aa7b6ea-e148-463c-9894-4aee950d210f", "indicator--5aa7b6ea-9e74-45d1-b7ff-4bc3950d210f", "indicator--5aa7b6ea-3364-45d6-bff0-4e39950d210f", "indicator--5aa7b6ea-c91c-4110-8559-4be2950d210f", "indicator--5aa7b6ea-7b58-428b-ac68-49ec950d210f", "indicator--5aa7b6ea-1fe8-436b-86c4-4df9950d210f", "indicator--5aa7b6ea-c8c4-4b2d-a50f-4efa950d210f", "indicator--5aa7b6ea-5b5c-403d-8d2b-4f05950d210f", "indicator--5aa7b6ea-f880-4cbe-a2dc-4366950d210f", "indicator--5aa7b6ea-b2f0-4cb9-9e81-4cc4950d210f", "indicator--5aa7b6ea-6f54-4307-8757-400d950d210f", "indicator--5aa7b6ea-15d8-44d3-973a-4bff950d210f", "indicator--5aa7b6ea-a5b4-426c-bee2-434e950d210f", "indicator--5aa7b6ea-4274-400d-9538-4ccd950d210f", "indicator--5aa7b6ea-da20-4a47-97a8-42c7950d210f", "indicator--5aa7b6ea-6678-498e-a7ec-49fe950d210f", "indicator--5aa7b6ea-f078-4f03-bd9f-419c950d210f", "indicator--5aa7b6ea-8180-4bca-8961-49e5950d210f", "indicator--5aa7b6ea-1d78-41c9-9040-4eb3950d210f", "indicator--5aa7b6ea-a32c-4cd7-9a9d-492a950d210f", "indicator--5aa7b6ea-2fe8-43e6-834e-4af1950d210f", "indicator--5aa7b6ea-b470-49d3-8e5a-4350950d210f", "indicator--5aa7b6ea-42bc-4775-893d-4fc7950d210f", "indicator--5aa7b6ea-cc58-4f5b-9987-42ac950d210f", "indicator--5aa7b6ea-4cf8-4ff1-a660-4271950d210f", "indicator--5aa7b6ea-ce60-4e35-ad65-44b3950d210f", "indicator--5aa7b6ea-6800-4a6e-8df0-43d5950d210f", "indicator--5aa7b6ea-e7d8-4cdd-8926-471b950d210f", "indicator--5aa7b6ea-8434-44f4-9140-47ef950d210f", "indicator--5aa7b6ea-0d6c-4d1f-857d-4192950d210f", "indicator--5aa7b6ea-9320-4dc8-9881-417d950d210f", "indicator--5aa7b6ea-0fd8-4901-b8bc-4743950d210f", "indicator--5aa7b6ea-af54-4fd5-8f44-4755950d210f", "indicator--5aa7b6ea-4cdc-4c75-85a4-4819950d210f", "indicator--5aa7b6ea-fb30-41c1-917c-499f950d210f", "indicator--5aa7b6ea-9ca0-458f-8aab-466e950d210f", "indicator--5aa7b6ea-46a8-4640-9263-4e1a950d210f", "indicator--5aa7b6ea-eebc-4b0a-9342-4791950d210f", "indicator--5aa7b6ea-8f64-4c18-8a30-4c7e950d210f", "indicator--5aa7b6ea-3a34-4048-a73a-4f60950d210f", "indicator--5aa7b6ea-ddfc-4991-a1da-4137950d210f", "indicator--5aa7b6ea-6d74-4b8f-a4cc-4c1f950d210f", "indicator--5aa7b6ea-f0d0-44aa-8e51-4dc5950d210f", "indicator--5aa7b6ea-6874-487d-b518-4dcb950d210f", "indicator--5aa7b6ea-0dcc-4a16-9418-4aa8950d210f", "indicator--5aa7b6ea-a514-4ef9-b6e6-42e5950d210f", "indicator--5aa7b6ea-7d34-4276-9a9e-4def950d210f", "indicator--5aa7b6ea-b1e8-471f-b8e0-4e24950d210f", "indicator--5aa7b6ea-e638-4df9-8eb4-48b2950d210f", "indicator--5aa7b6ea-0f98-442a-8de5-4910950d210f", "indicator--5aa7b6ea-412c-4af1-b8a0-4f85950d210f", "indicator--5aa7b6ea-6514-4125-a3b8-407e950d210f", "indicator--5aa7b6ea-5440-4413-a621-44c2950d210f", "indicator--5aa7b6ea-f934-4871-9673-4e93950d210f", "indicator--5aa7b6ea-7d58-43f4-87a2-49c8950d210f", "indicator--5aa7b6ea-175c-4ad1-a528-4722950d210f", "indicator--5aa7b6ea-c164-400b-b5c6-4aec950d210f", "indicator--5aa7b6ea-6978-490a-b2a6-45f2950d210f", "indicator--5aa7b6ea-13e4-4613-a8f3-476d950d210f", "indicator--5aa7b6ea-c300-4296-8ac2-480f950d210f", "indicator--5aa7b6ea-6600-46b2-966a-43e4950d210f", "indicator--5aa7b6ea-0a90-4d0c-8a92-404f950d210f", "indicator--5aa7b6ea-b434-4010-a94b-48b1950d210f", "indicator--5aa7b6ea-56d0-4a93-a3a4-4ef7950d210f", "indicator--5aa7b6ea-f0d4-4d5d-bebb-4b80950d210f", "indicator--5aa7b6ea-8ccc-43bf-81b0-43d7950d210f", "indicator--5aa7b6ea-3418-4fef-ab5e-4221950d210f", "indicator--5aa7b6ea-d268-4960-8b2b-4f87950d210f", "indicator--5aa7b6ea-888c-4bb9-9a84-461f950d210f", "indicator--5aa7b6ea-28d0-41d8-98a2-4883950d210f", "indicator--5aa7b6ea-db70-4309-9090-4ac3950d210f", "indicator--5aa7b6ea-7768-4b41-a8cc-41b0950d210f", "indicator--5aa7b6ea-1810-43d7-8640-4256950d210f", "indicator--5aa7b6ea-c664-42d9-af12-4914950d210f", "indicator--5aa7b6ea-70d0-4408-b5aa-4938950d210f", "indicator--5aa7b6ea-1c68-493e-b802-4674950d210f", "indicator--5aa7b6ea-c0f8-4ad3-94a3-4b01950d210f", "indicator--5aa7b6ea-5f48-4635-84c3-441f950d210f", "indicator--5aa7b6ea-fd98-462d-9fb7-4170950d210f", "indicator--5aa7b6ea-9418-4e6b-aa63-4205950d210f", "indicator--5aa7b6ea-1e7c-4378-95ad-4274950d210f", "indicator--5aa7b6ea-b3d0-4bc4-974e-43d2950d210f", "indicator--5aa7b759-f5f0-4a5b-a25e-4604950d210f", "indicator--5aa7b6ea-4280-4041-9376-4768950d210f", "indicator--5aa7b759-de14-4e64-b677-4d97950d210f", "indicator--5aa7b6ea-ca8c-45b9-905d-4975950d210f", "indicator--5aa7b759-67b0-49a0-8b59-40c0950d210f", "indicator--5aa7b6ea-561c-4125-9cbc-48cc950d210f", "indicator--5aa7b759-ec9c-47ae-ae64-48c5950d210f", "indicator--5aa7b6ea-d464-413b-9828-498d950d210f", "indicator--5aa7b759-6f94-4af2-83ef-4778950d210f", "indicator--5aa7b6ea-4ec4-41e6-9474-4103950d210f", "indicator--5aa7b759-f41c-4f5a-9e3f-4e78950d210f", "indicator--5aa7b6ea-eb20-4a0d-ae3f-4aa9950d210f", "indicator--5aa7b759-8010-4aaf-a177-4864950d210f", "indicator--5aa7b6ea-6e18-4a1c-8398-4db8950d210f", "indicator--5aa7b759-04fc-4910-9db4-415e950d210f", "indicator--5aa7b6ea-0114-47b8-a84f-468a950d210f", "indicator--5aa7b759-985c-4521-8f56-442f950d210f", "indicator--5aa7b6ea-b030-482d-a75c-469b950d210f", "indicator--5aa7b759-3cec-477e-b08d-4aae950d210f", "indicator--5aa7b6ea-5394-46f3-9a7e-4c75950d210f", "indicator--5aa7b759-c2a0-41dd-bd3a-43c5950d210f", "indicator--5aa7b6ea-f824-498f-91b0-4974950d210f", "indicator--5aa7b759-5344-4075-a623-4de1950d210f", "indicator--5aa7b6ea-8cb0-4863-9f15-4b24950d210f", "indicator--5aa7b759-e064-43a6-929e-4be9950d210f", "indicator--5aa7b6ea-2d58-44ea-98f4-4919950d210f", "indicator--5aa7b759-6ac8-4920-83a5-406e950d210f", "indicator--5aa7b6ea-c9b4-436b-b862-4387950d210f", "indicator--5aa7b759-eeec-4109-9ab8-41e8950d210f", "indicator--5aa7b6ea-3348-4924-8d98-4450950d210f", "indicator--5aa7b759-5d30-46db-a952-4e87950d210f", "indicator--5aa7b6ea-ac7c-46d9-9a2f-49de950d210f", "indicator--5aa7b759-de98-4e28-b9da-45de950d210f", "indicator--5aa7b6ea-2e48-4582-8c25-4643950d210f", "indicator--5aa7b759-50c4-4315-bbf0-46d3950d210f", "indicator--5aa7b6ea-b26c-482c-b3ff-4648950d210f", "indicator--5aa7b759-dde4-4cca-97c2-4bd9950d210f", "indicator--5aa7b6ea-2b3c-4cf7-8610-4600950d210f", "indicator--5aa7b759-4c28-41da-a411-4b3d950d210f", "indicator--5aa7b6ea-b604-4467-8f7f-4935950d210f", "indicator--5aa7b759-e884-474d-aad9-4c71950d210f", "indicator--5aa7b6ea-4324-4a47-a067-4d4b950d210f", "indicator--5aa7b759-77fc-431f-8d88-4d1b950d210f", "indicator--5aa7b6ea-ceb4-47c8-b501-4927950d210f", "indicator--5aa7b759-04b8-4708-861a-4a77950d210f", "indicator--5aa7b6ea-53a0-43b7-b282-4456950d210f", "indicator--5aa7b759-91d8-41ea-942f-48e0950d210f", "indicator--5aa7b6ea-d184-4edc-bc54-427e950d210f", "indicator--5aa7b759-10e8-4ace-b02c-4cda950d210f", "indicator--5aa7b6eb-7a20-4dc1-ad0c-40f7950d210f", "indicator--5aa7b759-8314-46ee-96be-4760950d210f", "indicator--5aa7b6eb-f930-403c-a562-4d54950d210f", "indicator--5aa7b759-0864-4818-8f52-4e56950d210f", "indicator--5aa7b6eb-73f4-404b-86ed-4053950d210f", "indicator--5aa7b759-9584-450f-b687-4ba9950d210f", "indicator--5aa7b6eb-f2a0-4594-acf7-43ba950d210f", "indicator--5aa7b759-281c-4ddf-961a-4e9d950d210f", "indicator--5aa7b6eb-8218-427b-8733-486c950d210f", "indicator--5aa7b759-b604-43a1-ac6c-4e2a950d210f", "indicator--5aa7b6eb-1ce4-434a-849e-4b31950d210f", "indicator--5aa7b759-4770-4213-80a4-45d2950d210f", "indicator--5aa7b6eb-ad88-42e9-ab32-4368950d210f", "indicator--5aa7b759-b67c-44c4-8f6d-4a8f950d210f", "indicator--5aa7b6eb-46c4-4d3b-b79a-48d5950d210f", "indicator--5aa7b759-2970-4f1e-befa-4e78950d210f", "indicator--5aa7b6eb-d5d8-4cc7-bd8b-4c05950d210f", "indicator--5aa7b759-bec4-497d-96e8-451e950d210f", "indicator--5aa7b6eb-5f10-439a-990a-4f6f950d210f", "indicator--5aa7b759-4a54-455d-bc42-47a4950d210f", "indicator--5aa7b6eb-c070-4c66-9d39-4b7b950d210f", "indicator--5aa7b759-e3f4-4320-9b52-4105950d210f", "indicator--5aa7b759-7c68-4f52-8c34-4baa950d210f", "indicator--5aa7b6eb-33c8-4424-8c0a-4f3d950d210f", "indicator--5aa7b759-22ec-4f31-810e-4460950d210f", "indicator--5aa7b6eb-c534-41f8-b815-4331950d210f", "indicator--5aa7b6eb-437c-48d7-8768-49b8950d210f", "indicator--5aa7b759-c13c-4e64-aa23-4682950d210f", "indicator--5aa7b759-5dfc-4d9b-936e-4bd3950d210f", "indicator--5aa7b6eb-c3b8-4fd7-8a37-45ee950d210f", "indicator--5aa7b780-58b8-4baa-bf9a-4633950d210f", "indicator--5aa7b780-5270-4f42-8018-403f950d210f", "indicator--5aa7b780-d2ac-4b6f-8a39-4ed4950d210f", "indicator--5aa7b780-4ca8-482c-8b68-410a950d210f", "indicator--5aa7b780-e51c-4966-87f1-47b6950d210f", "indicator--5aa7b780-6170-4d46-a4fd-4fae950d210f", "indicator--5aa7b780-dd60-441a-b64a-4736950d210f", "indicator--5aa7b780-4e60-4edc-a3bc-44c9950d210f", "indicator--5aa7b780-c2e4-4c81-95a9-492d950d210f", "indicator--5aa7b780-5450-40f2-ae74-4320950d210f", "indicator--5aa7b780-bb8c-4c29-89df-49f2950d210f", "indicator--5aa7b780-2264-4db3-ae6e-44bc950d210f", "indicator--5aa7b780-8554-40c8-8af2-4bb0950d210f", "indicator--5aa7b780-3538-4b67-bbf6-464f950d210f", "indicator--5aa7b780-58bc-455f-ae78-4f58950d210f", "indicator--5aa7b780-3b68-4311-80f6-4971950d210f", "indicator--5aa7b780-a7b8-46a2-ab13-4613950d210f", "indicator--5aa7b780-1b10-4f66-b76e-4fb5950d210f", "indicator--5aa7b780-8440-48a7-b027-4f93950d210f", "indicator--5aa7b780-fcac-473c-95aa-4bed950d210f", "indicator--5aa7b780-6af0-401b-acec-40c7950d210f", "indicator--5aa7b780-cd18-4755-a2da-44f1950d210f", "indicator--5aa7b780-3328-48ff-8d7b-4b96950d210f", "indicator--5aa7b780-a3c4-4c09-b296-4735950d210f", "indicator--5aa7b780-09d4-4972-8b33-48d8950d210f", "indicator--5aa7b780-6d28-4331-a467-4e47950d210f", "indicator--5aa7b780-49f8-498a-b20b-4404950d210f", "indicator--5aa7b780-e43c-4dce-8721-4622950d210f", "indicator--5aa7b780-7ee4-4f4c-82f7-41c6950d210f", "indicator--5aa7b780-adbc-489b-8565-4bfc950d210f", "indicator--5aa7b780-31e0-4418-85bd-4c3d950d210f", "indicator--5aa7b780-ae34-49da-a051-433a950d210f", "indicator--5aa7b780-4f40-4d27-adaf-4f56950d210f", "indicator--5aa7b780-cacc-4f4a-865d-40b2950d210f", "indicator--5aa7b780-50e4-4530-a16b-486a950d210f", "indicator--5aa7b780-da80-4f4e-83bd-4450950d210f", "indicator--5aa7b780-6d18-4945-9013-49c4950d210f", "indicator--5aa7b780-d648-49a1-a1b7-42e6950d210f", "indicator--5aa7b780-3230-4c30-aaea-419a950d210f", "indicator--5aa7b780-9cf0-4d70-881c-4a90950d210f", "indicator--5aa7b780-f748-4af9-bbb7-49e7950d210f", "indicator--5aa7b780-739c-4dee-a39a-4aa1950d210f", "indicator--5aa7b780-d8e4-43d4-b67f-4995950d210f", "indicator--5aa7b780-52e0-4863-b0e9-4fe2950d210f", "indicator--5aa7b780-d768-4630-8e6d-4309950d210f", "indicator--5aa7b780-58d0-4e30-9b69-45a9950d210f", "indicator--5aa7b780-bc88-4239-8b95-46b8950d210f", "indicator--5aa7b780-27ac-43d4-9bfa-4316950d210f", "indicator--5aa7b780-7e80-4045-9459-404c950d210f", "indicator--5aa7b780-d234-4bdb-9865-4f92950d210f", "indicator--5aa7b780-23f4-4227-a935-4bc2950d210f", "indicator--5aa7b780-8a04-4753-a29e-42fd950d210f", "indicator--5aa7b780-e970-495a-85cc-407e950d210f", "indicator--5aa7b780-4878-4cf4-b991-42df950d210f", "indicator--5aa7b780-ac30-4cdf-968b-4bfd950d210f", "indicator--5aa7b780-28e8-4fbc-ae5c-4c3f950d210f", "indicator--5aa7b780-b0f4-4f6a-a583-47e9950d210f", "indicator--5aa7b780-6bc8-413b-99b0-4779950d210f", "indicator--5aa7b780-0888-4b8c-aa72-4235950d210f", "indicator--5aa7b780-9224-45ca-9d2c-462b950d210f", "indicator--5aa7b780-1648-418f-9a9a-4d58950d210f", "indicator--5aa7b780-9b34-422e-b7fe-4b62950d210f", "indicator--5aa7b780-19e0-40e1-9213-4157950d210f", "indicator--5aa7b79b-639c-4300-bb85-4de6950d210f", "indicator--5aa7b780-a5d4-4a9c-ba00-4e67950d210f", "indicator--5aa7b79b-0cdc-45e4-930d-431a950d210f", "indicator--5aa7b780-33bc-49fe-bffd-42a0950d210f", "indicator--5aa7b79b-8480-43f7-be90-4c66950d210f", "indicator--5aa7b780-bcf4-48c6-87df-4d88950d210f", "indicator--5aa7b79b-f008-41c4-b61e-4040950d210f", "indicator--5aa7b780-4438-4fa5-8551-4682950d210f", "indicator--5aa7b79b-4e48-4efe-a46d-4e42950d210f", "indicator--5aa7b780-db1c-431d-8932-4b44950d210f", "indicator--5aa7b780-8588-4e27-95a3-4e4f950d210f", "indicator--5aa7b79b-a9cc-4682-9451-4cc8950d210f", "indicator--5aa7b780-06f0-4255-ae08-45f8950d210f", "indicator--5aa7b79b-1b30-48a3-86bd-42d0950d210f", "indicator--5aa7b780-6e2c-477f-ac93-46d5950d210f", "indicator--5aa7b79b-7844-49cc-ab9f-4203950d210f", "indicator--5aa7b780-e120-4816-b6b5-483b950d210f", "indicator--5aa7b79b-5ce4-4078-850e-4225950d210f", "indicator--5aa7b780-5158-4c23-8fe2-4ddc950d210f", "indicator--5aa7b79b-b2f0-4f95-a7c0-4aaf950d210f", "indicator--5aa7b780-cc80-462c-a089-4e96950d210f", "indicator--5aa7b79b-b860-491e-814d-4cf9950d210f", "indicator--5aa7b780-480c-401e-bab4-492d950d210f", "indicator--5aa7b79b-ca50-4462-a13e-4ec7950d210f", "indicator--5aa7b780-c398-4685-af97-42ab950d210f", "indicator--5aa7b79b-ef64-41fd-b7c6-450a950d210f", "indicator--5aa7b780-61e8-4981-8e0f-4430950d210f", "indicator--5aa7b79b-06cc-4f04-be98-4292950d210f", "indicator--5aa7b780-bb78-4bf9-982b-45ca950d210f", "indicator--5aa7b79b-172c-4ef8-bf92-4526950d210f", "indicator--5aa7b780-35d8-4e74-9dd5-4034950d210f", "indicator--5aa7b79b-020c-4fe6-8db1-4da1950d210f", "indicator--5aa7b780-a098-4f95-8672-483c950d210f", "indicator--5aa7b79b-03f8-4688-b729-4853950d210f", "indicator--5aa7b780-2200-4092-bac0-4ee7950d210f", "indicator--5aa7b79b-fbbc-4c6c-9e36-4b73950d210f", "indicator--5aa7b780-b178-4906-a02a-4de7950d210f", "indicator--5aa7b79b-2f44-413a-8bb2-4d29950d210f", "indicator--5aa7b780-fe88-4bf6-a95b-43ea950d210f", "indicator--5aa7b79b-9b70-4642-849d-4205950d210f", "indicator--5aa7b780-56ec-4367-bcb7-44ef950d210f", "indicator--5aa7b79b-ac98-4179-ad53-4283950d210f", "indicator--5aa7b780-dd68-464f-b1bc-4cf0950d210f", "indicator--5aa7b79b-bbcc-47a9-9948-4ef5950d210f", "indicator--5aa7b780-550c-410e-91a1-4b7d950d210f", "indicator--5aa7b79b-da3c-4b77-b4be-4726950d210f", "indicator--5aa7b780-f35c-44c9-a88e-4b9a950d210f", "indicator--5aa7b79b-0dc4-4a25-9c28-4d32950d210f", "indicator--5aa7b780-5a98-4a79-b99d-4ff5950d210f", "indicator--5aa7b79b-2e28-4875-b206-4cff950d210f", "indicator--5aa7b780-a938-4085-bdf3-41c5950d210f", "indicator--5aa7b79b-3e24-4d46-8ca7-47f9950d210f", "indicator--5aa7b79b-6fb8-43dc-928b-4988950d210f", "indicator--5aa7b780-1cf4-47b7-a561-44c7950d210f", "indicator--5aa7b79b-7208-442a-b8db-4055950d210f", "indicator--5aa7b780-8cc8-4d55-8f93-4786950d210f", "indicator--5aa7b79b-6e7c-4bfb-a832-4c89950d210f", "indicator--5aa7b780-05fc-44c2-a57e-42f8950d210f", "indicator--5aa7b79b-7004-4dbc-bd4d-4256950d210f", "indicator--5aa7b780-7cd8-4c06-ba05-43cd950d210f", "indicator--5aa7b79b-8190-4a84-a4a7-4ea8950d210f", "indicator--5aa7b780-f670-4829-b7e1-4681950d210f", "indicator--5aa7b79b-8f98-478a-9c90-4284950d210f", "indicator--5aa7b780-8070-4a44-8dff-43b9950d210f", "indicator--5aa7b79b-aa20-4bcb-bb76-470f950d210f", "indicator--5aa7b780-0368-46dd-b7c9-4f9b950d210f", "indicator--5aa7b79b-b3dc-4871-8e24-468d950d210f", "indicator--5aa7b780-8ca0-4826-9841-4afe950d210f", "indicator--5aa7b79b-c374-435f-ad18-48cd950d210f", "indicator--5aa7b780-118c-4001-8ec1-4717950d210f", "indicator--5aa7b79b-c5c4-459c-ac3a-4a1c950d210f", "indicator--5aa7b780-8d7c-472a-ac34-45bd950d210f", "indicator--5aa7b79b-d048-4a75-b588-4f1f950d210f", "indicator--5aa7b780-0afc-408d-a749-45ce950d210f", "indicator--5aa7b79b-c8d4-45e6-a957-4d2b950d210f", "indicator--5aa7b780-936c-43c2-bd83-418f950d210f", "indicator--5aa7b79b-c228-45d9-a478-4eb8950d210f", "indicator--5aa7b780-0a48-40bf-af86-4b40950d210f", "indicator--5aa7b79b-c0f4-4c9f-a8a1-4880950d210f", "indicator--5aa7b780-51e0-4c96-a9ee-4b7e950d210f", "indicator--5aa7b79b-bca0-47c8-9580-4f07950d210f", "indicator--5aa7b780-afbc-4bcd-a09a-4563950d210f", "indicator--5aa7b79b-bfb8-4722-af5c-491f950d210f", "indicator--5aa7b780-3958-4432-9495-4c03950d210f", "indicator--5aa7b79b-d1a8-421c-95b0-4546950d210f", "indicator--5aa7b79b-ecf8-43bd-9d34-49d9950d210f", "indicator--5aa7b780-ae40-414a-9f0c-45dc950d210f", "indicator--5aa7b780-2648-4894-9560-43d9950d210f", "indicator--5aa7b79b-f074-42ed-8604-4d07950d210f", "indicator--5aa7b780-87a8-448e-b259-403b950d210f", "indicator--5aa7b79b-e2c0-42f1-89df-4e60950d210f", "indicator--5aa7b780-05f0-4c69-a145-437e950d210f", "indicator--5aa7b79b-e574-49fc-ad99-4371950d210f", "indicator--5aa7b79b-e7c4-4a98-bff4-4ac3950d210f", "indicator--5aa7b780-7d94-488e-85f7-4f9c950d210f", "indicator--5aa7b79b-cb9c-457a-ae82-4447950d210f", "indicator--5aa7b780-f7f4-4c54-944f-4d5b950d210f", "indicator--5aa7b79b-99f8-4c63-9665-4c18950d210f", "indicator--5aa7b780-8fa0-4a1c-8ac3-46bc950d210f", "indicator--5aa7b79b-8988-43f5-8ba1-4eec950d210f", "indicator--5aa7b780-080c-4c8e-87f6-41ce950d210f", "indicator--5aa7b79b-7d00-4d6e-bd1d-4353950d210f", "indicator--5aa7b780-952c-4366-9231-467e950d210f", "indicator--5aa7b79b-84c8-4099-aec9-45b7950d210f", "indicator--5aa7b780-22b0-4ff4-beb3-4f30950d210f", "indicator--5aa7b79b-7390-4528-9bdc-4e0f950d210f", "indicator--5aa7b780-ad78-485a-8820-46bc950d210f", "indicator--5aa7b79b-6bb8-4cd0-b24b-4b66950d210f", "indicator--5aa7b780-5078-45c9-a666-4672950d210f", "indicator--5aa7b79b-6da4-4bfa-85c4-47c2950d210f", "indicator--5aa7b780-cfec-4887-932c-447e950d210f", "indicator--5aa7b79b-76fc-44e4-a6f4-4052950d210f", "indicator--5aa7b780-6d74-480a-a496-492c950d210f", "indicator--5aa7b79b-6ccc-4c94-919e-49e6950d210f", "indicator--5aa7b780-f774-49e9-b165-4e6f950d210f", "indicator--5aa7b79b-72a0-4dfc-88bc-4fd3950d210f", "indicator--5aa7b780-6fe0-409c-ba96-4719950d210f", "indicator--5aa7b79b-78d8-47bb-be56-481e950d210f", "indicator--5aa7b780-d910-4f1d-8241-4f15950d210f", "indicator--5aa7b79b-91d0-442d-af94-40f5950d210f", "indicator--5aa7b780-31d8-4548-84ec-415a950d210f", "indicator--5aa7b79b-b2fc-4fd9-8f8a-43c6950d210f", "indicator--5aa7b780-8910-4e36-9527-4fe5950d210f", "indicator--5aa7b79b-bd80-4625-ac3a-47db950d210f", "indicator--5aa7b780-fa10-4537-b97a-4d19950d210f", "indicator--5aa7b79b-a66c-4e4e-b6e2-4b51950d210f", "indicator--5aa7b780-6e94-4130-b608-4474950d210f", "indicator--5aa7b79b-aab0-4e40-8494-445b950d210f", "indicator--5aa7b780-eb4c-4c8f-9d0c-4547950d210f", "indicator--5aa7b780-7038-4899-808e-4008950d210f", "indicator--5aa7b79b-9fb8-4b54-94a1-414e950d210f", "indicator--5aa7b780-f0d8-4c49-844e-4273950d210f", "indicator--5aa7b79b-9a9c-41d8-9d8b-44e5950d210f", "indicator--5aa7b780-70b0-485d-b589-48fa950d210f", "indicator--5aa7b79b-825c-4686-8366-48af950d210f", "indicator--5aa7b780-e214-4fcb-87bf-442d950d210f", "indicator--5aa7b79b-53d8-4be7-8afd-4df9950d210f", "indicator--5aa7b780-74ac-4fe3-b925-4979950d210f", "indicator--5aa7b79b-4430-4d09-919f-4c37950d210f", "indicator--5aa7b780-ffd8-4ecb-bdff-4ddb950d210f", "indicator--5aa7b79b-3d20-4140-86ef-4aaf950d210f", "indicator--5aa7b780-8208-4759-9baa-4f91950d210f", "indicator--5aa7b79b-51cc-46b3-8987-474f950d210f", "indicator--5aa7b780-0690-41b6-90d1-47d2950d210f", "indicator--5aa7b79b-573c-4df3-b865-42a2950d210f", "indicator--5aa7b780-9cac-4c93-b505-4c66950d210f", "indicator--5aa7b79b-728c-45ce-9cde-4ed3950d210f", "indicator--5aa7b780-faec-42c8-b51e-426b950d210f", "indicator--5aa7b79b-6028-4d1c-9e2c-49e6950d210f", "indicator--5aa7b780-673c-42a3-b31d-4541950d210f", "indicator--5aa7b79b-4b6c-4e0d-b8ae-4fab950d210f", "indicator--5aa7b780-dc24-4a89-8c24-4b88950d210f", "indicator--5aa7b79b-238c-4753-99c1-4ecc950d210f", "indicator--5aa7b780-49a0-419f-88e9-4eb4950d210f", "indicator--5aa7b79b-1aec-4465-b9b4-4412950d210f", "indicator--5aa7b780-c84c-4988-8aab-439b950d210f", "indicator--5aa7b79b-f9b0-47e6-aa48-409a950d210f", "indicator--5aa7b780-3d98-4daa-a1e9-4297950d210f", "indicator--5aa7b79b-02a4-4467-be1c-4ff3950d210f", "indicator--5aa7b780-c734-482c-88c9-469c950d210f", "indicator--5aa7b79b-204c-4200-838e-40d7950d210f", "indicator--5aa7b780-489c-411c-912f-4e63950d210f", "indicator--5aa7b79b-5758-442a-af2c-440a950d210f", "indicator--5aa7b780-cf7c-4e50-a6df-4688950d210f", "indicator--5aa7b79b-79b0-48d3-8f92-48a5950d210f", "indicator--5aa7b780-60e8-44f3-abb2-4e06950d210f", "indicator--5aa7b79b-ca20-43e3-9634-44a7950d210f", "indicator--5aa7b79b-dff8-40ae-bcea-488f950d210f", "indicator--5aa7b780-e764-4326-ac50-4544950d210f", "indicator--5aa7b79b-f56c-42ed-ab91-4166950d210f", "indicator--5aa7b780-69f8-4902-8c3d-42cc950d210f", "indicator--5aa7b79b-eec0-4ecd-85c5-4c18950d210f", "indicator--5aa7b79b-ee54-480f-b4ee-4eea950d210f", "indicator--5aa7b780-0140-42b4-aa48-420e950d210f", "indicator--5aa7b780-7d30-4578-b4f5-445b950d210f", "indicator--5aa7b79b-d100-4708-94d8-47f7950d210f", "indicator--5aa7b780-0e9c-49ff-9e87-4841950d210f", "indicator--5aa7b79b-f290-432f-a28f-4739950d210f", "indicator--5aa7b79b-ce34-43be-9797-4be4950d210f", "indicator--5aa7b780-92c0-45c3-970f-4ec7950d210f", "indicator--5aa7b79b-d14c-4b30-a425-4485950d210f", "indicator--5aa7b780-210c-4346-af3d-43c7950d210f", "indicator--5aa7b79b-b6b4-4313-a8fe-46ad950d210f", "indicator--5aa7b780-9a40-4328-b313-4a3a950d210f", "indicator--5aa7b79b-b134-4c2e-bfc0-414b950d210f", "indicator--5aa7b780-030c-4963-ab37-4403950d210f", "indicator--5aa7b79b-a3e4-4a88-aba7-47f5950d210f", "indicator--5aa7b780-9284-40b5-83d7-4ea4950d210f", "indicator--5aa7b79b-b37c-4b47-ad63-4ccd950d210f", "indicator--5aa7b780-17d4-4df1-8712-4d23950d210f", "indicator--5aa7b79b-b374-4eba-85bd-41fc950d210f", "indicator--5aa7b780-94f0-40c6-b3ce-466b950d210f", "indicator--5aa7b79b-ba10-41a1-844d-43aa950d210f", "indicator--5aa7b780-f4c0-4e15-8274-481c950d210f", "indicator--5aa7b79b-c2a0-4fb1-852b-4bca950d210f", "indicator--5aa7b780-7d30-4bcc-94d7-4b26950d210f", "indicator--5aa7b79b-d238-4d2c-b00e-4c3b950d210f", "indicator--5aa7b780-f088-4075-b41e-4ad5950d210f", "indicator--5aa7b79b-c4e8-4cf9-bb98-450e950d210f", "indicator--5aa7b780-6e08-4b09-b7ab-4856950d210f", "indicator--5aa7b79b-c79c-4425-957a-42fa950d210f", "indicator--5aa7b780-ee44-439a-93a9-4bdb950d210f", "indicator--5aa7b79b-b1b4-43f7-bdc2-468e950d210f", "indicator--5aa7b780-73f8-4c57-a0db-4592950d210f", "indicator--5aa7b79b-a720-4233-a24d-4634950d210f", "indicator--5aa7b780-efe8-4c5c-95cb-491a950d210f", "indicator--5aa7b79b-9c28-4617-b260-49e7950d210f", "indicator--5aa7b780-72e0-4f68-aba0-40ef950d210f", "indicator--5aa7b79b-a4b8-4c58-b24f-4b35950d210f", "indicator--5aa7b780-c8ec-46a6-9557-41c6950d210f", "indicator--5aa7b79b-bbbc-485e-859c-4c07950d210f", "indicator--5aa7b781-47bc-426b-9431-45a5950d210f", "indicator--5aa7b79b-ce10-4d56-9124-4474950d210f", "indicator--5aa7b781-aaac-4774-91e5-49f7950d210f", "indicator--5aa7b79b-bc10-4163-a86c-4a28950d210f", "indicator--5aa7b781-21ec-4452-8f14-4802950d210f", "indicator--5aa7b79b-d3dc-4af4-931e-46fa950d210f", "indicator--5aa7b781-7e9c-43f5-ba21-4fd6950d210f", "indicator--5aa7b79b-c5c4-4f79-9fd0-46ec950d210f", "indicator--5aa7b781-2520-4e5f-8c98-4ff0950d210f", "indicator--5aa7b79b-e114-423d-9e09-4ecc950d210f", "indicator--5aa7b781-a750-4238-bd84-4624950d210f", "indicator--5aa7b79b-f494-49d7-9767-46ee950d210f", "indicator--5aa7b79b-1ebc-477a-bd20-4352950d210f", "indicator--5aa7b781-1e90-42ad-a0af-4698950d210f", "indicator--5aa7b79b-5a78-46f4-a2f3-4618950d210f", "indicator--5aa7b781-9634-4aa6-a067-45ba950d210f", "indicator--5aa7b79b-8310-4208-83d5-4bee950d210f", "indicator--5aa7b781-eab0-4e8c-9659-417a950d210f", "indicator--5aa7b781-3c70-4d00-8169-4700950d210f", "indicator--5aa7b79b-7b38-461e-b19f-4377950d210f", "indicator--5aa7b781-9ab0-4298-a3c6-4c5f950d210f", "indicator--5aa7b79b-7428-4d6a-a8db-4ba7950d210f", "indicator--5aa7b781-195c-4b3a-a530-43b6950d210f", "indicator--5aa7b79b-5800-4c16-a5e5-45f8950d210f", "indicator--5aa7b781-9e48-47e2-8187-439b950d210f", "indicator--5aa7b79b-5604-4c95-b99d-45c2950d210f", "indicator--5aa7b781-2334-4d22-93b3-453f950d210f", "indicator--5aa7b79b-659c-4c1b-9593-4daa950d210f", "indicator--5aa7b781-a62c-49f4-be70-490a950d210f", "indicator--5aa7b79b-7408-45b9-87b2-4a9d950d210f", "indicator--5aa7b781-3cac-4e03-8ef7-45a7950d210f", "indicator--5aa7b79b-6c94-4f26-b278-42c2950d210f", "indicator--5aa7b79b-7650-4d28-b952-437b950d210f", "indicator--5aa7b781-c454-4635-a14f-4ea5950d210f", "indicator--5aa7b79b-9970-40c4-8fd1-4fea950d210f", "indicator--5aa7b781-2f78-4f43-921f-4eda950d210f", "indicator--5aa7b79b-99cc-4eab-be8a-4231950d210f", "indicator--5aa7b781-b658-46d1-91c0-468c950d210f", "indicator--5aa7b79b-aa2c-4a42-bbcc-4474950d210f", "indicator--5aa7b781-2a14-4a0a-8430-46be950d210f", "indicator--5aa7b79b-bd48-42f6-8694-49ee950d210f", "indicator--5aa7b781-a7f8-4ae6-9025-4c6e950d210f", "indicator--5aa7b79b-b7c8-44be-ad2e-4e7f950d210f", "indicator--5aa7b781-163c-45fa-8f5e-4959950d210f", "indicator--5aa7b79b-cae4-4727-87a3-4e01950d210f", "indicator--5aa7b781-8ac0-4042-ba99-4dd1950d210f", "indicator--5aa7b79b-cc6c-4b18-bc18-495c950d210f", "indicator--5aa7b781-fcec-4f8e-a9dc-4628950d210f", "indicator--5aa7b79b-0f94-4046-bf66-4067950d210f", "indicator--5aa7b781-7eb8-4ad0-82b6-4206950d210f", "indicator--5aa7b79b-2828-4c0b-833f-49df950d210f", "indicator--5aa7b781-0f5c-419d-9291-48d0950d210f", "indicator--5aa7b79b-5a20-4c72-861a-4c86950d210f", "indicator--5aa7b781-7b48-4700-aa3b-4789950d210f", "indicator--5aa7b79b-6f30-4124-a4c2-4db1950d210f", "indicator--5aa7b781-d668-4d8f-95d2-43cd950d210f", "indicator--5aa7b79b-9188-4076-b496-48b5950d210f", "indicator--5aa7b781-3638-46d9-ac3d-42a3950d210f", "indicator--5aa7b79b-9888-4f43-ada9-438e950d210f", "indicator--5aa7b781-902c-46aa-937c-45dd950d210f", "indicator--5aa7b79b-be64-4eba-a055-4873950d210f", "indicator--5aa7b781-2198-4a4a-89fe-4df7950d210f", "indicator--5aa7b79b-ccd0-44ef-9bc3-41c8950d210f", "indicator--5aa7b781-a940-4501-ad81-4905950d210f", "indicator--5aa7b79b-e820-44b0-8b00-4f6e950d210f", "indicator--5aa7b781-4b78-49ff-8b34-44e5950d210f", "indicator--5aa7b79b-ddf0-48c6-9b19-4d36950d210f", "indicator--5aa7b781-c6a0-4495-9bcd-48d0950d210f", "indicator--5aa7b781-4d80-41ce-b252-4769950d210f", "indicator--5aa7b79b-f6e8-4d3c-94a0-494a950d210f", "indicator--5aa7b781-b138-4f8e-a14e-4f9c950d210f", "indicator--5aa7b79b-02fc-4218-87b6-44c5950d210f", "indicator--5aa7b781-1680-433a-9671-49e1950d210f", "indicator--5aa7b79b-0934-4378-be42-465b950d210f", "indicator--5aa7b781-6b60-4f37-8cdc-4107950d210f", "indicator--5aa7b781-d878-41ca-8cf3-4e4d950d210f", "indicator--5aa7b79b-fe3c-4bdc-8400-4a67950d210f", "indicator--5aa7b781-2e20-489b-9022-4337950d210f", "indicator--5aa7b79b-fca4-4fcf-8457-4177950d210f", "indicator--5aa7b781-9304-4d28-af5d-4da4950d210f", "indicator--5aa7b79b-0b74-4278-990d-4675950d210f", "indicator--5aa7b781-f20c-4f67-9d73-4547950d210f", "indicator--5aa7b79b-17ec-4ab9-8df0-4f01950d210f", "indicator--5aa7b781-6a14-4cd5-b967-4636950d210f", "indicator--5aa7b79b-1aa0-4140-9baa-4ec4950d210f", "indicator--5aa7b781-c91c-4965-95a5-40d3950d210f", "indicator--5aa7b79b-2204-49b4-ba4b-48a0950d210f", "indicator--5aa7b781-2310-4dbd-b927-4f26950d210f", "indicator--5aa7b79b-1edc-4197-81bc-4b9f950d210f", "indicator--5aa7b781-921c-4ede-9ea0-44aa950d210f", "indicator--5aa7b79b-2e74-45ca-a9ea-4d93950d210f", "indicator--5aa7b781-fe08-40d7-a913-4d68950d210f", "indicator--5aa7b79b-4578-4f9a-b8e3-4d45950d210f", "indicator--5aa7b781-5f68-4fd3-8501-4454950d210f", "indicator--5aa7b79b-612c-40d7-9fa7-4b7b950d210f", "indicator--5aa7b781-cc80-488c-97e9-4c93950d210f", "indicator--5aa7b79b-8bb8-43b8-acd5-4602950d210f", "indicator--5aa7b781-1990-4f70-8438-4c27950d210f", "indicator--5aa7b79b-c580-48b8-8b63-429f950d210f", "indicator--5aa7b79b-ec88-49e8-8010-4897950d210f", "indicator--5aa7b781-82c0-4f18-b910-4568950d210f", "indicator--5aa7b79b-326c-49f4-94c0-4a75950d210f", "indicator--5aa7b781-e358-411a-b57e-46f0950d210f", "indicator--5aa7b79b-4a9c-4381-a56e-4bb6950d210f", "indicator--5aa7b781-46ac-442c-8a4e-4f3a950d210f", "indicator--5aa7b79b-6844-4ddc-ad5b-4f02950d210f", "indicator--5aa7b781-9d1c-4c8a-a4b8-4418950d210f", "indicator--5aa7b79b-9528-45dd-bf1e-472e950d210f", "indicator--5aa7b781-f7d8-4cc0-8ac1-433f950d210f", "indicator--5aa7b79b-d7ec-44ea-ab65-432a950d210f", "indicator--5aa7b781-580c-4c8d-bd84-4ebd950d210f", "indicator--5aa7b79b-fe2c-4a1f-9e3c-4603950d210f", "indicator--5aa7b781-bc28-4126-94d3-4846950d210f", "indicator--5aa7b79b-1dc8-4f28-aa3b-4246950d210f", "indicator--5aa7b781-2238-44e8-ac14-42dc950d210f", "indicator--5aa7b79b-58bc-463f-a99a-4aaf950d210f", "indicator--5aa7b781-8140-4263-87d5-4549950d210f", "indicator--5aa7b79b-6728-495a-a69a-4966950d210f", "indicator--5aa7b781-e23c-48ac-9deb-49f8950d210f", "indicator--5aa7b79b-55f0-4d4c-bc29-49e0950d210f", "indicator--5aa7b781-533c-4c62-a335-4091950d210f", "indicator--5aa7b781-ca18-421b-83f7-4b65950d210f", "indicator--5aa7b79b-4e18-4615-b581-4f4c950d210f", "indicator--5aa7b781-3ca8-46d5-a73a-42f3950d210f", "indicator--5aa7b79b-4f3c-44b4-8085-4fda950d210f", "indicator--5aa7b781-b514-4379-b0f0-494b950d210f", "indicator--5aa7b79b-6b54-4dcd-8307-4521950d210f", "indicator--5aa7b781-3938-4d9a-9d01-49a3950d210f", "indicator--5aa7b79b-60c0-44ee-b5dc-4e03950d210f", "indicator--5aa7b781-9a98-4d9a-a9a8-44ac950d210f", "indicator--5aa7b79b-7a80-4976-b70d-4287950d210f", "indicator--5aa7b781-fdec-419c-b6cb-447f950d210f", "indicator--5aa7b79b-94a4-4597-b5d6-45c7950d210f", "indicator--5aa7b781-8e2c-4a1e-98cd-440f950d210f", "indicator--5aa7b79b-c700-417b-bbb7-4f53950d210f", "indicator--5aa7b781-1ffc-4818-bafd-45e3950d210f", "indicator--5aa7b79b-faec-4219-b054-43b4950d210f", "indicator--5aa7b781-a290-4f3c-b86f-432f950d210f", "indicator--5aa7b79b-2514-4768-a41c-4ac5950d210f", "indicator--5aa7b781-3eec-4336-8aee-4bb6950d210f", "indicator--5aa7b79b-4bb8-40b9-8422-4eba950d210f", "indicator--5aa7b781-b94c-4d72-b28e-42ba950d210f", "indicator--5aa7b79b-7004-4df9-8e55-4141950d210f", "indicator--5aa7b781-3c44-4ab7-bf6a-4136950d210f", "indicator--5aa7b79b-9770-4418-be49-472e950d210f", "indicator--5aa7b781-d38c-4302-9c09-4814950d210f", "indicator--5aa7b79b-ad48-4379-aa2c-48c8950d210f", "indicator--5aa7b781-5490-477a-b061-4e70950d210f", "indicator--5aa7b79b-cb54-4326-83ee-4a95950d210f", "indicator--5aa7b781-cf54-41d8-a768-4a5a950d210f", "indicator--5aa7b79b-e320-4f7b-a18e-433b950d210f", "indicator--5aa7b781-5f30-4275-be6f-41e8950d210f", "indicator--5aa7b79b-17d4-4776-9a15-4ef7950d210f", "indicator--5aa7b781-df6c-4d72-9d5c-4d1b950d210f", "indicator--5aa7b79b-2514-46fe-883f-42d1950d210f", "indicator--5aa7b781-506c-4e78-ad56-46c9950d210f", "indicator--5aa7b79b-46a4-4411-86da-4f96950d210f", "indicator--5aa7b781-bd20-41e3-87dd-4409950d210f", "indicator--5aa7b79b-71f8-434c-8dad-45f9950d210f", "indicator--5aa7b781-245c-40e0-bcb0-4da9950d210f", "indicator--5aa7b79b-a710-4bd7-8b33-40c2950d210f", "indicator--5aa7b781-9ad4-4014-937f-411d950d210f", "indicator--5aa7b79b-a76c-4198-9d9b-4be8950d210f", "indicator--5aa7b781-259c-46ca-b3b2-47df950d210f", "indicator--5aa7b79b-b31c-4c3d-a9e5-42da950d210f", "indicator--5aa7b781-9188-4cee-acaa-4ef5950d210f", "indicator--5aa7b79b-c0c0-44fe-ae50-447a950d210f", "indicator--5aa7b781-e154-4faf-8485-4150950d210f", "indicator--5aa7b79b-c248-4404-8a08-4f8b950d210f", "indicator--5aa7b781-3ff8-4272-98f5-4bd7950d210f", "indicator--5aa7b79b-c240-4e5b-b24d-4a2c950d210f", "indicator--5aa7b781-b2ec-4c12-8401-427c950d210f", "indicator--5aa7b79b-d87c-440a-8aa3-40c1950d210f", "indicator--5aa7b781-1dac-4883-ab4f-48b5950d210f", "indicator--5aa7b79b-ddec-405a-82b8-413c950d210f", "indicator--5aa7b781-81c8-4af9-a246-435c950d210f", "indicator--5aa7b79b-e3c0-4660-a13c-410a950d210f", "indicator--5aa7b781-f64c-4172-8fa1-41cf950d210f", "indicator--5aa7b79b-e354-4432-91c2-453d950d210f", "indicator--5aa7b781-85c4-4ec3-b9b3-4268950d210f", "indicator--5aa7b79b-eea0-470e-bf7c-4324950d210f", "indicator--5aa7b781-0088-41a4-ae58-408c950d210f", "indicator--5aa7b79b-2fd4-4a41-9852-46a4950d210f", "indicator--5aa7b781-8704-4cd6-aea4-4c90950d210f", "indicator--5aa7b79b-3ea4-4641-9271-4c04950d210f", "indicator--5aa7b781-1488-4500-9848-4bf4950d210f", "indicator--5aa7b79b-28bc-4c72-954a-43db950d210f", "indicator--5aa7b781-a9dc-4062-9cb6-469c950d210f", "indicator--5aa7b79b-2e2c-4ea9-9e10-4e2e950d210f", "indicator--5aa7b781-4444-4e5d-8094-4130950d210f", "indicator--5aa7b79b-1cf4-4c52-b0c1-4f72950d210f", "indicator--5aa7b781-c228-4e78-866f-44a1950d210f", "indicator--5aa7b79b-23f4-4a45-8b49-49d7950d210f", "indicator--5aa7b781-49d0-47fe-b144-4c99950d210f", "indicator--5aa7b781-c9a8-4b43-b9f8-4242950d210f", "indicator--5aa7b79b-13e8-41b1-b016-40e7950d210f", "indicator--5aa7b781-1b04-45ae-b078-4423950d210f", "indicator--5aa7b79b-1f98-4106-b94d-42e9950d210f", "indicator--5aa7b781-6f1c-4a0f-960e-4b42950d210f", "indicator--5aa7b79b-fc68-4d8c-af9b-4186950d210f", "indicator--5aa7b781-bc2c-4812-9dea-48aa950d210f", "indicator--5aa7b79b-f364-46e9-8c12-44d3950d210f", "indicator--5aa7b781-2818-41b8-8bfe-4410950d210f", "indicator--5aa7b79b-eb8c-438c-ac2c-4b28950d210f", "indicator--5aa7b781-7dc0-4b8d-a08f-40a0950d210f", "indicator--5aa7b79b-df68-48ba-819c-4d05950d210f", "indicator--5aa7b781-bf7c-4517-b1a6-432e950d210f", "indicator--5aa7b79b-ee38-4e8c-83f0-4cad950d210f", "indicator--5aa7b781-2974-44dd-b799-45fb950d210f", "indicator--5aa7b79b-ed68-4a18-8203-4551950d210f", "indicator--5aa7b781-8818-462d-9ad3-45c7950d210f", "indicator--5aa7b79b-ffbc-4538-a36e-43ab950d210f", "indicator--5aa7b781-ed60-42f8-aa71-4288950d210f", "indicator--5aa7b79b-00e0-440a-855c-4d18950d210f", "indicator--5aa7b781-3944-4988-8d9f-4209950d210f", "indicator--5aa7b79b-f5e8-4303-b1d5-4049950d210f", "indicator--5aa7b781-7c2c-46f7-8a47-4b5d950d210f", "indicator--5aa7b79b-ea8c-4cec-b6dd-4d89950d210f", "indicator--5aa7b781-d4f4-40d3-b62b-47d2950d210f", "indicator--5aa7b79b-fe70-4d3e-b613-4050950d210f", "indicator--5aa7b781-051c-4716-af5c-43ff950d210f", "indicator--5aa7b79b-ee64-43e5-91a0-45ff950d210f", "indicator--5aa7b781-31c0-4df7-9430-495c950d210f", "indicator--5aa7b79b-eb3c-4cfc-bb29-4c23950d210f", "indicator--5aa7b781-8894-41f5-b564-4be3950d210f", "indicator--5aa7b79b-dbf8-4a4f-bddd-45ce950d210f", "indicator--5aa7b781-c85c-4231-8c05-4d5d950d210f", "indicator--5aa7b79b-e67c-4861-95e2-4fb8950d210f", "indicator--5aa7b781-043c-450d-b5ca-4d66950d210f", "indicator--5aa7b79b-d6d4-42e3-9f04-42f1950d210f", "indicator--5aa7b781-55fc-4b8e-b609-4358950d210f", "indicator--5aa7b79b-e220-4eb4-96ff-48e7950d210f", "indicator--5aa7b79b-fd70-4d44-88a9-426e950d210f", "indicator--5aa7b781-904c-4569-9898-4dee950d210f", "indicator--5aa7b79b-15a0-4f39-be14-4f4c950d210f", "indicator--5aa7b781-d014-40cd-b016-4b8c950d210f", "indicator--5aa7b79b-2e98-4afa-a81c-479a950d210f", "indicator--5aa7b781-16e4-421d-b264-439e950d210f", "indicator--5aa7b79b-2f58-4cba-bd99-4690950d210f", "indicator--5aa7b781-4518-4ecc-bf3e-44f2950d210f", "indicator--5aa7b79b-4d64-4925-a452-48d5950d210f", "indicator--5aa7b781-81c0-47fd-8d85-4f96950d210f", "indicator--5aa7b79b-746c-4db6-a80d-421b950d210f", "indicator--5aa7b781-ca20-4ace-99f7-481d950d210f", "indicator--5aa7b79b-8530-48a0-9bcf-4e56950d210f", "indicator--5aa7b781-2090-46ad-a8f0-481d950d210f", "indicator--5aa7b79b-b660-40d8-b0a6-4788950d210f", "indicator--5aa7b781-9000-4f9d-9988-4d67950d210f", "indicator--5aa7b79b-b0e0-4196-bbbe-4802950d210f", "indicator--5aa7b781-0e48-48ad-ae44-491f950d210f", "indicator--5aa7b79b-b90c-4f22-b63c-47a5950d210f", "indicator--5aa7b781-82cc-48d8-b438-4b9f950d210f", "indicator--5aa7b79b-c840-42f0-af39-4bfd950d210f", "indicator--5aa7b781-cfdc-4937-b85f-42e9950d210f", "indicator--5aa7b79b-c518-4443-9b2c-4c58950d210f", "indicator--5aa7b781-4a3c-4bdd-a59c-4d22950d210f", "indicator--5aa7b79b-c31c-4112-8706-4268950d210f", "indicator--5aa7b781-c050-4226-b9a9-4d7b950d210f", "indicator--5aa7b79b-d69c-4549-8ea5-4dbf950d210f", "indicator--5aa7b781-3344-44e1-8ef4-44cb950d210f", "indicator--5aa7b79b-df2c-4433-8dcf-44f5950d210f", "indicator--5aa7b781-aae8-484e-8409-465f950d210f", "indicator--5aa7b79b-f504-4598-85ae-44a1950d210f", "indicator--5aa7b781-1f6c-4088-b6fe-47e0950d210f", "indicator--5aa7b79b-f2a4-4ada-9575-4fde950d210f", "indicator--5aa7b781-9a30-4810-9646-4a29950d210f", "indicator--5aa7b79b-1f88-4a5b-b41b-41af950d210f", "indicator--5aa7b781-0810-4bbd-9b9c-4ed6950d210f", "indicator--5aa7b79b-3a10-4d9a-9871-4d87950d210f", "indicator--5aa7b781-8464-4b26-9ecc-4360950d210f", "indicator--5aa7b79b-62a8-4a56-a180-4e0f950d210f", "indicator--5aa7b79b-817c-453e-affc-4226950d210f", "indicator--5aa7b781-1c10-4478-8a07-4a67950d210f", "indicator--5aa7b781-b7a4-4745-ae07-4eb2950d210f", "indicator--5aa7b79b-8f84-40f3-85bb-452b950d210f", "indicator--5aa7b79b-b114-4b2a-97af-40c9950d210f", "indicator--5aa7b781-52d4-4302-a3c8-4299950d210f", "indicator--5aa7b79b-bb34-4c9b-81fd-4a22950d210f", "indicator--5aa7b79b-cdec-417a-b3f7-4fb7950d210f", "indicator--5aa7b781-e058-4269-b215-4b0e950d210f", "indicator--5aa7b781-6670-42b5-a763-442d950d210f", "indicator--5aa7b79b-be44-462c-9caf-4afe950d210f", "indicator--5aa7b79b-9ca4-4a41-916c-4740950d210f", "indicator--5aa7b781-01a0-4aed-87a5-4e91950d210f", "indicator--5aa7b79b-852c-437e-92fa-4c8c950d210f", "indicator--5aa7b781-5cc0-4fac-bace-4c6e950d210f", "indicator--5aa7b79b-5c84-416a-834f-4ffe950d210f", "indicator--5aa7b781-c974-4a46-b6bb-4663950d210f", "indicator--5aa7b79b-68fc-4fbb-8345-4563950d210f", "indicator--5aa7b781-4a78-4d49-8ecb-46f7950d210f", "indicator--5aa7b79b-731c-44db-b62d-41b8950d210f", "indicator--5aa7b781-f228-4204-be34-4bb6950d210f", "indicator--5aa7b79b-6c70-402c-ad96-470a950d210f", "indicator--5aa7b781-7714-483d-bc9a-4208950d210f", "indicator--5aa7b79b-6a74-426f-8476-408d950d210f", "indicator--5aa7b781-fd90-4fce-825e-4e74950d210f", "indicator--5aa7b79b-76ec-494f-b9eb-4a73950d210f", "indicator--5aa7b781-9474-4905-b4a6-4541950d210f", "indicator--5aa7b79b-522c-4e04-8849-4594950d210f", "indicator--5aa7b781-2e78-4e45-994f-43b9950d210f", "indicator--5aa7b79b-3988-41fe-846b-42e8950d210f", "indicator--5aa7b781-b364-437d-900a-4a65950d210f", "indicator--5aa7b79b-1400-414f-a7a6-444a950d210f", "indicator--5aa7b781-4d04-43c6-b1da-48a5950d210f", "indicator--5aa7b79b-064c-41d2-89b4-446b950d210f", "indicator--5aa7b781-0bc0-4e4a-a9a8-45ff950d210f", "indicator--5aa7b79b-d69c-452c-a43e-4b44950d210f", "indicator--5aa7b781-8eb8-406a-baaa-4588950d210f", "indicator--5aa7b79b-b9ac-4f2e-a0f7-4e48950d210f", "indicator--5aa7b781-0404-4a4a-a6c5-42c6950d210f", "indicator--5aa7b79b-ba6c-47f8-ae02-437c950d210f", "indicator--5aa7b781-7b44-4a03-a873-4897950d210f", "indicator--5aa7b79b-bb2c-4681-b7b3-4b96950d210f", "indicator--5aa7b79b-9c48-4ec0-8b50-401b950d210f", "indicator--5aa7b781-2358-42c0-8587-4976950d210f", "indicator--5aa7b79b-6d60-4c08-a0e7-4527950d210f", "indicator--5aa7b781-964c-4419-9f76-43a5950d210f", "indicator--5aa7b79b-39c8-4dc7-b31e-416e950d210f", "indicator--5aa7b781-1cc8-435f-9f2b-43cd950d210f", "indicator--5aa7b79b-19b8-4820-b2c4-4ab4950d210f", "indicator--5aa7b781-9728-4c8b-bd10-4b13950d210f", "indicator--5aa7b781-1c14-45ef-8699-4aa2950d210f", "indicator--5aa7b79b-f430-4714-a593-4bb6950d210f", "indicator--5aa7b781-aa60-4547-a889-4250950d210f", "indicator--5aa7b79b-c28c-4ef6-a819-4926950d210f", "indicator--5aa7b781-4338-47b2-8fa3-459c950d210f", "indicator--5aa7b79b-a8bc-4511-882f-4c7f950d210f", "indicator--5aa7b79b-81a4-4b5d-8883-4b2d950d210f", "indicator--5aa7b781-ce64-40cc-93ce-435e950d210f", "indicator--5aa7b79b-53e8-4efa-9872-494f950d210f", "indicator--5aa7b781-0850-42eb-ad14-4c8c950d210f", "indicator--5aa7b79b-1948-4988-a86b-4684950d210f", "indicator--5aa7b781-a4ac-4b62-896a-46ee950d210f", "indicator--5aa7b79b-2110-4782-b3ce-4cee950d210f", "indicator--5aa7b781-286c-49ae-a577-489b950d210f", "indicator--5aa7b79b-1f78-411b-93f5-4b8b950d210f", "indicator--5aa7b781-e340-4c52-b9bc-4f06950d210f", "indicator--5aa7b79b-1e44-426f-9cea-43a0950d210f", "indicator--5aa7b781-a3f0-4814-8997-4ea4950d210f", "indicator--5aa7b79b-fab0-4ed5-b934-42b8950d210f", "indicator--5aa7b781-6888-483f-a659-4880950d210f", "indicator--5aa7b79b-f080-4bef-aada-40c5950d210f", "indicator--5aa7b781-0548-41ef-93f1-4970950d210f", "indicator--5aa7b79b-d9d0-42c3-bd8a-410b950d210f", "indicator--5aa7b781-7a94-4981-8fed-4a39950d210f", "indicator--5aa7b79b-d0cc-4dbb-9899-4128950d210f", "indicator--5aa7b781-1e5c-4466-85bf-4d1c950d210f", "indicator--5aa7b79b-c570-43dd-bdbb-47ea950d210f", "indicator--5aa7b781-b0f4-4f9a-b002-4655950d210f", "indicator--5aa7b79b-b2a8-4180-9561-455d950d210f", "indicator--5aa7b781-17cc-447d-9e56-47fc950d210f", "indicator--5aa7b79b-867c-48f3-a474-49fc950d210f", "indicator--5aa7b781-92f4-47b0-8c94-4a80950d210f", "indicator--5aa7b79b-8098-467c-bcef-405a950d210f", "indicator--5aa7b781-fa94-4368-af2b-45df950d210f", "indicator--5aa7b79b-5534-4e2a-8560-4d28950d210f", "indicator--5aa7b781-7df0-40e1-bb47-4eaa950d210f", "indicator--5aa7b79b-5ef0-435d-9379-44ff950d210f", "indicator--5aa7b781-ee8c-4ae9-a3e7-46b4950d210f", "indicator--5aa7b79b-5b64-471e-8ab8-4377950d210f", "indicator--5aa7b781-7184-421b-be01-4f88950d210f", "indicator--5aa7b79b-3b54-4e94-8419-4b5f950d210f", "indicator--5aa7b781-c8bc-4b5c-a69d-4e91950d210f", "indicator--5aa7b79b-1568-487d-aa1d-4ec3950d210f", "indicator--5aa7b781-2378-469e-80ad-4bc6950d210f", "indicator--5aa7b79b-f1d4-4ba3-b6bc-4748950d210f", "indicator--5aa7b781-b548-4c17-b90a-4049950d210f", "indicator--5aa7b79b-d5ac-4e85-bc17-416a950d210f", "indicator--5aa7b781-1068-4cc8-b1ce-487e950d210f", "indicator--5aa7b79b-d158-46f3-a676-426d950d210f", "indicator--5aa7b781-8de8-4262-954d-4703950d210f", "indicator--5aa7b79b-5388-4fef-8bad-49ac950d210f", "indicator--5aa7b781-0910-454b-a346-4442950d210f", "indicator--5aa7b79b-b038-4852-a2de-440d950d210f", "indicator--5aa7b781-8dfc-4185-98db-4ebe950d210f", "indicator--5aa7b79b-0ce8-4399-96a0-429d950d210f", "indicator--5aa7b781-0f64-4647-bca5-469e950d210f", "indicator--5aa7b79b-5d18-4692-88cb-4cb9950d210f", "indicator--5aa7b781-6f98-4720-8ac9-486b950d210f", "indicator--5aa7b79b-e45c-4ddf-9220-445a950d210f", "indicator--5aa7b781-f038-48af-9493-4b1e950d210f", "indicator--5aa7b79b-63d0-4b46-bfb9-40a9950d210f", "indicator--5aa7b781-470c-48f7-98d0-4c32950d210f", "indicator--5aa7b79b-e024-453c-bb8a-4ed7950d210f", "indicator--5aa7b781-c5b8-450f-a716-4b74950d210f", "indicator--5aa7b79b-5c14-43a5-b57c-4964950d210f", "indicator--5aa7b781-277c-44fc-885f-4116950d210f", "indicator--5aa7b79b-a7f8-4645-baf5-46e8950d210f", "indicator--5aa7b781-829c-4cea-9070-45a3950d210f", "indicator--5aa7b79b-1894-4353-aa45-4998950d210f", "indicator--5aa7b781-e780-4a6c-91bf-4224950d210f", "indicator--5aa7b79b-6284-4954-837f-491d950d210f", "indicator--5aa7b781-4f84-4438-aa81-4789950d210f", "indicator--5aa7b79b-9a18-4e39-ae00-4bb9950d210f", "indicator--5aa7b781-efc8-4de8-aa73-448c950d210f", "indicator--5aa7b79b-6298-46fb-a6f9-4ca9950d210f", "indicator--5aa7b781-6ce4-47de-8c6b-4aab950d210f", "indicator--5aa7b79b-ba98-460a-bede-4551950d210f", "indicator--5aa7b79b-2bfc-4f5d-abda-4533950d210f", "indicator--5aa7b79b-b408-4e7b-ad48-4e0c950d210f", "indicator--5aa7b79b-2bac-4f53-b060-4fc6950d210f", "indicator--5aa7b79b-ba5c-47c4-bd14-4df8950d210f", "indicator--5aa7b79b-2c88-4909-bd88-43b7950d210f", "indicator--5aa7b79b-91d0-4b33-a459-4555950d210f", "indicator--5aa7b79b-f330-4937-a015-4f3a950d210f", "indicator--5aa7b79b-6368-4d1a-aac4-4acf950d210f", "indicator--5aa7b79b-ec3c-486c-9b23-4aac950d210f", "indicator--5aa7b79b-411c-430b-b382-460a950d210f", "indicator--5aa7b79b-ad08-4d70-9f1e-44d3950d210f", "indicator--5aa7b79b-1f34-4b0d-8ed9-4766950d210f", "indicator--5aa7b79b-8350-4fe3-bb0d-4c85950d210f", "indicator--5aa7b79b-df9c-4258-9de8-4ea1950d210f", "indicator--5aa7b79b-4868-4df0-ba3a-4cc7950d210f", "indicator--5aa7b79b-d524-4b5f-92da-4467950d210f", "indicator--5aa7b79b-4a0c-46d5-991b-4fb5950d210f", "indicator--5aa7b79b-aef0-479b-bd38-423e950d210f", "indicator--5aa7b79b-1d98-4e3c-8003-431f950d210f", "indicator--5aa7b79b-8664-4fee-8ba9-4adf950d210f", "indicator--5aa7b79b-e24c-4a2f-955c-46c0950d210f", "indicator--5aa7b79b-5cac-4ce6-9bc6-402b950d210f", "indicator--5aa7b79b-cc1c-48da-a6ba-4bf1950d210f", "indicator--5aa7b79b-2b88-42d4-a029-4a6a950d210f", "indicator--5aa7b79b-a138-4036-8592-477e950d210f", "indicator--5aa7b79b-efd8-4b32-9106-425d950d210f", "indicator--5aa7b79b-30cc-4d95-a17e-4d10950d210f", "indicator--5aa7b79b-e0b0-418b-915c-405a950d210f", "indicator--5aa7b79b-52dc-45a9-8662-47d0950d210f", "indicator--5aa7b79b-ad34-4f77-9c05-4a96950d210f", "indicator--5aa7b79b-1538-4451-834a-4164950d210f", "indicator--5aa7b79b-8b4c-42c1-99dd-4cf7950d210f", "indicator--5aa7b79b-efcc-45d1-87d1-4883950d210f", "indicator--5aa7b79b-4574-41a2-b843-493f950d210f", "indicator--5aa7b79b-97fc-4e40-8802-4b4e950d210f", "indicator--5aa7b79b-da80-4112-bdaf-496b950d210f", "indicator--5aa7b79b-272c-4d6a-99ed-4fa8950d210f", "indicator--5aa7b79b-7f90-4c7b-ac55-4b56950d210f", "indicator--5aa7b79b-e348-4d6d-819b-4e56950d210f", "indicator--5aa7b79b-4c78-4855-86bd-4dfe950d210f", "indicator--5aa7b79b-ad74-4c3a-8f1e-495e950d210f", "indicator--5aa7b79b-e3dc-4071-8f58-4a73950d210f", "indicator--5aa7b79b-3858-422d-bd6e-415c950d210f", "indicator--5aa7b79b-b574-4a53-9f44-4dcb950d210f", "indicator--5aa7b79b-fe9c-46cd-a8c3-4444950d210f", "indicator--5aa7b79b-6ce0-4f63-8066-498d950d210f", "indicator--5aa7b79b-e09c-4f0e-8084-4c9e950d210f", "indicator--5aa7b79b-13e4-4fe4-88bd-4650950d210f", "indicator--5aa7b79b-5348-460a-af1f-4f42950d210f", "indicator--5aa7b79b-b0c0-44ab-b4b1-4502950d210f", "indicator--5aa7b79b-06cc-43d0-a2fa-4174950d210f", "indicator--5aa7b79b-5ecc-4193-bee1-4c48950d210f", "indicator--5aa7b79b-c090-4e22-814c-4038950d210f", "indicator--5aa7b79b-1638-4aae-bf8b-4995950d210f", "indicator--5aa7b79b-6794-4382-a1aa-41ca950d210f", "indicator--5aa7b79b-c37c-4227-a755-4ed8950d210f", "indicator--5aa7b79b-1ab4-4bbf-9f9d-40c0950d210f", "indicator--5aa7b79b-8448-4dcc-b6e1-4476950d210f", "indicator--5aa7b79b-e030-42a2-878a-4bcb950d210f", "indicator--5aa7b79b-51f8-44d2-bbb2-4d11950d210f", "indicator--5aa7b79b-bcb8-4ec9-a197-4b54950d210f", "indicator--5aa7b79b-42d0-4a24-b025-49d1950d210f", "indicator--5aa7b79b-b0b0-4af0-994a-4264950d210f", "indicator--5aa7b79b-165c-4e80-aba2-4af2950d210f", "indicator--5aa7b79b-48dc-4952-9ae3-4e9c950d210f", "indicator--5aa7b79b-83f4-4bee-90ba-4b51950d210f", "indicator--5aa7b79b-c998-4445-b7bf-489a950d210f", "indicator--5aa7b79b-0ed8-4fe1-b724-477d950d210f", "indicator--5aa7b79b-41bc-45ac-ad23-4786950d210f", "indicator--5aa7b79b-60b4-4833-b7b8-42e7950d210f", "indicator--5aa7b79b-a658-408c-a179-4f17950d210f", "indicator--5aa7b79b-0628-449a-8771-49be950d210f", "indicator--5aa7b79b-6ef4-4d20-bbe6-47ed950d210f", "indicator--5aa7b79b-f890-4dd1-a950-4ac9950d210f", "indicator--5aa7b79b-6738-415f-b93e-43f7950d210f", "indicator--5aa7b79b-d194-4485-94a5-4d9e950d210f", "indicator--5aa7b79b-1738-43a3-8a37-406d950d210f", "indicator--5aa7b79b-6574-4389-8986-4eb2950d210f", "indicator--5aa7b79b-b2e8-450a-a5e2-4ba9950d210f", "indicator--5aa7b79b-df8c-499d-8245-4088950d210f", "indicator--5aa7b79b-14c8-4a3d-8025-4556950d210f", "indicator--5aa7b79b-493c-4e1a-aa90-451e950d210f", "indicator--5aa7b79b-7838-485c-87b1-49d3950d210f", "indicator--5aa7b79b-ab80-4bd4-ab08-404a950d210f", "indicator--5aa7b79b-dff4-4c58-b363-4075950d210f", "indicator--5aa7b79b-1c38-4286-9e94-42d9950d210f", "indicator--5aa7b79b-843c-490e-98e8-4cec950d210f", "indicator--5aa7b79b-c4cc-4e5f-809f-499e950d210f", "indicator--5aa7b79b-33d8-4567-bfd6-4cc6950d210f", "indicator--5aa7b79b-bcac-4964-9e64-46b6950d210f", "indicator--5aa7b79b-5714-45db-8816-4c79950d210f", "indicator--5aa7b79b-f244-45da-8e9c-49b7950d210f", "indicator--5aa7b79b-4aa8-4b56-ba2c-418c950d210f", "indicator--5aa7b79b-bd9c-4337-953c-4d1a950d210f", "indicator--5aa7b79b-28c0-4cd3-b965-48f5950d210f", "indicator--5aa7b79b-9bb4-44d8-8312-45a9950d210f", "indicator--5aa7b79b-028c-417d-8c10-4a52950d210f", "indicator--5aa7b79b-6770-44bc-8fc1-468d950d210f", "indicator--5aa7b79b-e5b8-4721-acfa-4236950d210f", "indicator--5aa7b79b-5140-4f76-9d6e-4bd8950d210f", "indicator--5aa7b79b-b5c0-46d4-bd31-4949950d210f", "indicator--5aa7b79b-3408-4298-a6f2-4099950d210f", "indicator--5aa7b79b-9824-416c-a62f-494b950d210f", "indicator--5aa7b79b-06cc-4724-96d9-4b09950d210f", "indicator--5aa7b79b-6ed0-4a99-bfd7-4bac950d210f", "indicator--5aa7b79b-b668-4574-bfdb-4bc2950d210f", "indicator--5aa7b79b-0760-40ea-a39b-476e950d210f", "indicator--5aa7b79b-608c-460a-933e-4f1b950d210f", "indicator--5aa7b79b-a824-436a-91f2-482c950d210f", "indicator--5aa7b79b-1410-447b-bfdb-4579950d210f", "indicator--5aa7b79b-63dc-4021-81a1-4cce950d210f", "indicator--5aa7b79b-9c38-4f2c-87e8-4b60950d210f", "indicator--5aa7b79b-c6e8-47e3-a82b-4569950d210f", "indicator--5aa7b79b-1a38-4c26-bbf6-4107950d210f", "indicator--5aa7b79b-7044-4cba-ad57-496f950d210f", "indicator--5aa7b79b-c77c-48a5-a390-460a950d210f", "indicator--5aa7b79b-18d8-47a6-9fee-460f950d210f", "indicator--5aa7b79b-78a8-4dd2-a8e3-44ed950d210f", "indicator--5aa7b79b-bbf4-4e9c-b783-42c8950d210f", "indicator--5aa7b79b-ded4-4ac4-8bbe-4896950d210f", "indicator--5aa7b79b-f46c-4225-9f90-499d950d210f", "indicator--5aa7b79b-4dfc-4178-80d2-4dc5950d210f", "indicator--5aa7b79b-c21c-443a-bea8-4ffb950d210f", "indicator--5aa7b79b-0c70-4a24-a705-4adb950d210f", "indicator--5aa7b79b-5980-40ff-985e-4644950d210f", "indicator--5aa7b79b-ae60-4521-b27b-4650950d210f", "indicator--5aa7b79b-ccf4-413d-9a54-43b0950d210f", "indicator--5aa7b79b-2df0-4dda-9ec7-45a8950d210f", "indicator--5aa7b79b-920c-4f49-8be9-4ef1950d210f", "indicator--5aa7b79b-fa74-4f3f-891d-4ba5950d210f", "indicator--5aa7b79b-7ab0-45e3-9001-4124950d210f", "indicator--5aa7b79b-d184-4d27-b0d5-4352950d210f", "indicator--5aa7b79b-30f0-4e47-9dca-4468950d210f", "indicator--5aa7b79b-82b0-4157-9b6a-419b950d210f", "indicator--5aa7b79b-b33c-4490-9d3f-49f7950d210f", "indicator--5aa7b79b-0f88-449d-9046-4556950d210f", "indicator--5aa7b79b-6850-4f09-9814-4c19950d210f", "indicator--5aa7b79b-c8e8-4c3f-8d37-4404950d210f", "indicator--5aa7b79b-1788-4cba-b5b6-48a7950d210f", "indicator--5aa7b79b-52a0-42f5-a575-4342950d210f", "indicator--5aa7b79b-a1a4-4061-b6c1-4001950d210f", "indicator--5aa7b79b-0c00-4fd0-9d78-481d950d210f", "indicator--5aa7b79b-526c-42e9-9a30-43cb950d210f", "indicator--5aa7b79b-c3d0-4241-99d9-40e3950d210f", "indicator--5aa7b79b-1978-462e-89be-4991950d210f", "indicator--5aa7b79b-75c4-43fc-b6dc-4312950d210f", "indicator--5aa7b79b-c978-45ea-b917-4c8b950d210f", "indicator--5aa7b79b-0cc4-4f58-a571-4b66950d210f", "indicator--5aa7b79b-5330-433a-809d-4cbd950d210f", "indicator--5aa7b79b-7f0c-4046-b2af-43b9950d210f", "indicator--5aa7b79b-9ff8-496e-8c4e-4cee950d210f", "indicator--5aa7b79b-0478-44a9-b00e-48a7950d210f", "indicator--5aa7b79b-7190-4de0-b7db-4a3f950d210f", "indicator--5aa7b79b-9ca4-48d9-8af5-4b26950d210f", "indicator--5aa7b79c-0c9c-451d-8b8c-4ca5950d210f", "indicator--5aa7b79c-3e54-4cbb-bd9b-42b3950d210f", "indicator--5aa7b79c-95f0-456c-b801-400c950d210f", "indicator--5aa7b79c-deb4-4836-941e-465f950d210f", "indicator--5aa7b79c-5dc4-42c4-93fc-416f950d210f", "indicator--5aa7b79c-c62c-485a-83be-4943950d210f", "indicator--5aa7b79c-3790-44d2-8484-4057950d210f", "indicator--5aa7b79c-6df8-4055-88ad-45ee950d210f", "indicator--5aa7b8c0-2458-41f1-a93d-452a950d210f", "indicator--5aa7b8c0-6200-46b8-9fed-4685950d210f", "indicator--5aa7b8c0-80cc-4aec-89a3-48ff950d210f", "indicator--5aa7b8c0-7694-4386-807a-4751950d210f", "indicator--5aa7b8c0-98a4-4465-8d20-4d23950d210f", "indicator--5aa7b8c0-48a4-4eb1-b189-4630950d210f", "indicator--5aa7b8c0-e4b8-4d8a-b177-47da950d210f", "indicator--5aa7b8c0-0f84-4900-9e64-4f43950d210f", "indicator--5aa7b8c0-5054-4c77-9282-46d7950d210f", "indicator--5aa7b8c0-e520-48c3-8533-4949950d210f", "indicator--5aa7b8c0-43e0-4fda-989d-4e05950d210f", "indicator--5aa7b8c0-e0bc-4e77-8ac2-452e950d210f", "indicator--5aa7b8c0-cce4-4ca9-bb12-40cf950d210f", "indicator--5aa7b8c0-8e14-474d-aa40-4409950d210f", "indicator--5aa7b8c0-42c4-4936-9679-47b2950d210f", "indicator--5aa7b8c0-2e88-47be-a987-4764950d210f", "indicator--5aa7b8c0-1b14-4f77-bf18-4880950d210f", "indicator--5aa7b8c0-ce34-4b37-ac9f-4c65950d210f", "indicator--5aa7b8c0-6e94-41a8-8d09-477c950d210f", "indicator--5aa7b8c0-c908-47bd-97ce-44b5950d210f", "indicator--5aa7b8c0-7990-4354-869d-4b48950d210f", "indicator--5aa7b8c0-4e90-4969-908f-43f6950d210f", "indicator--5aa7b8c0-637c-44b8-b741-422a950d210f", "indicator--5aa7b8c0-e860-40e5-b4b4-4980950d210f", "indicator--5aa7b8c0-71f4-470b-b0cf-43d1950d210f", "indicator--5aa7b8c0-3f80-4eda-8b44-4f4c950d210f", "indicator--5aa7b8c0-c870-4ff8-8d3f-4efe950d210f", "indicator--5aa7b8c0-e400-4b2b-9a3a-47b3950d210f", "indicator--5aa7b8c0-ce18-4cca-9953-4d99950d210f", "indicator--5aa7b8c0-7478-4269-aca3-4ed0950d210f", "indicator--5aa7b8c0-1410-4870-942d-4441950d210f", "indicator--5aa7b8c0-b218-4b2f-993f-4aca950d210f", "indicator--5aa7b8c0-32d4-478a-95c8-4e75950d210f", "indicator--5aa7b8c0-d208-4096-bbf2-4e8e950d210f", "indicator--5aa7b8c0-3064-4b26-8370-4f60950d210f", "indicator--5aa7b8c0-7818-4202-aac3-431c950d210f", "indicator--5aa7b8c0-b734-4958-8d65-491f950d210f", "indicator--5aa7b8c0-a978-4c59-b92c-40fb950d210f", "indicator--5aa7b8c0-d078-4459-854b-4076950d210f", "indicator--5aa7b8c0-fdb8-4c15-9f62-46d8950d210f", "indicator--5aa7b8c0-2fa8-4d0a-8faf-4bac950d210f", "indicator--5aa7b8c0-2d00-433d-8912-4f16950d210f", "indicator--5aa7b8c0-8e7c-4055-9ac3-4ccc950d210f", "indicator--5aa7b8c0-e3dc-4ca1-8e7b-4997950d210f", "indicator--5aa7b8c0-e774-4704-8be7-4e92950d210f", "indicator--5aa7b8c0-ec38-4b24-8f42-4d1b950d210f", "indicator--5aa7b8c0-f160-49b2-94df-48b9950d210f", "indicator--5aa7b8c0-0e5c-4eee-8616-49da950d210f", "indicator--5aa7b8c0-e4a4-4d3e-aa89-44d7950d210f", "indicator--5aa7b8c0-b128-4200-b1f2-4343950d210f", "indicator--5aa7b8c0-8770-42d0-92e7-4b1b950d210f", "indicator--5aa7b8c0-519c-4368-b51e-4ef4950d210f", "indicator--5aa7b8c0-2334-43c7-b708-4c42950d210f", "indicator--5aa7b8c0-e144-4952-85cf-463c950d210f", "indicator--5aa7b8c0-86b8-41bb-859b-4866950d210f", "indicator--5aa7b8c0-33fc-4662-af5a-43b8950d210f", "indicator--5aa7b8c0-1728-4bea-b816-4296950d210f", "indicator--5aa7b8c0-bb70-4553-854c-436a950d210f", "indicator--5aa7b8c0-6530-45b2-acaa-4e20950d210f", "indicator--5aa7b8c0-c2c4-486a-b144-4969950d210f", "indicator--5aa7b8c0-2120-4bf5-a3d3-478d950d210f", "indicator--5aa7b8c0-7874-48f0-94d2-44d8950d210f", "indicator--5aa7b8c0-d540-4665-a892-45ac950d210f", "indicator--5aa7b8c0-3e28-4a55-aa7a-4b81950d210f", "indicator--5aa7b8c0-9edc-48da-911e-4b09950d210f", "indicator--5aa7b8c0-d498-4c0e-a6c5-4182950d210f", "indicator--5aa7b8c0-70ac-43cb-91e6-4b53950d210f", "indicator--5aa7b8c0-3114-46b3-a294-4523950d210f", "indicator--5aa7b8c0-e880-4668-8db6-4fb5950d210f", "indicator--5aa7b8c0-9fec-44da-a37a-44b7950d210f", "indicator--5aa7b8c0-62ac-4ae7-8293-4fd2950d210f", "indicator--5aa7b8c0-2ecc-4e0b-bd4c-4f06950d210f", "indicator--5aa7b8c0-0af0-417d-8069-4f8c950d210f", "indicator--5aa7b8c0-071c-4698-b7b3-4aa0950d210f", "indicator--5aa7b8c0-09ec-4ff5-a4ec-42b2950d210f", "indicator--5aa7b8c0-7ef0-433e-8c5f-4e86950d210f", "indicator--5aa7b8c0-af98-4b7a-a04c-4d93950d210f", "indicator--5aa7b8c0-0cc8-4119-b63f-4e32950d210f", "indicator--5aa7b8c0-5be8-4b69-91e1-4eb9950d210f", "indicator--5aa7b8c0-0030-4b96-8a3e-4945950d210f", "indicator--5aa7b8c0-aa54-433e-aac3-400a950d210f", "indicator--5aa7b8c0-87a4-42e8-9761-4f52950d210f", "indicator--5aa7b8c0-3998-46cc-8648-4d2c950d210f", "indicator--5aa7b8c0-2818-4606-a33e-4c4e950d210f", "indicator--5aa7b8c0-f9b0-4687-9d6f-476e950d210f", "indicator--5aa7b8c0-b1e4-4516-b653-41f2950d210f", "indicator--5aa7b8c0-7da0-496f-8ace-4652950d210f", "indicator--5aa7b8c0-4254-4b6b-8e2a-453c950d210f", "indicator--5aa7b8c0-0960-4762-b74a-420f950d210f", "indicator--5aa7b8c0-3d68-44bf-9060-4bf1950d210f", "indicator--5aa7b8c0-69e0-40a4-8ad2-47c0950d210f", "indicator--5aa7b8c0-8eec-40f9-af5e-4943950d210f", "indicator--5aa7b8c0-abc4-47f7-b16f-4e5a950d210f", "indicator--5aa7b8c0-0c54-4075-9825-42ef950d210f", "indicator--5aa7b8c0-d234-44ab-992e-41d6950d210f", "indicator--5aa7b8c0-84f0-40db-a0ae-459b950d210f", "indicator--5aa7b8c0-4bfc-4666-97b4-4712950d210f", "indicator--5aa7b8c0-1ec0-4f6b-94a5-4176950d210f", "indicator--5aa7b8c0-d884-4d4f-9af0-407e950d210f", "indicator--5aa7b8c0-51d4-4c45-a4fa-4371950d210f", "indicator--5aa7b8c0-d998-468d-b58c-4691950d210f", "indicator--5aa7b8c0-5a54-4415-b5bf-481d950d210f", "indicator--5aa7b8c0-eca4-4f85-a3e5-4858950d210f", "indicator--5aa7b8c0-86c4-46bd-b10c-404f950d210f", "indicator--5aa7b8c0-1c34-43b6-aba1-4775950d210f", "indicator--5aa7b8c0-a650-4f75-b83d-427d950d210f", "indicator--5aa7b8c0-5e20-4ffc-97fd-42dc950d210f", "indicator--5aa7b8c0-1b68-4c3d-ae45-416e950d210f", "indicator--5aa7b8c0-f4d0-4667-a502-4784950d210f", "indicator--5aa7b8c0-b27c-4d7d-a2b5-4e19950d210f", "indicator--5aa7b8c0-4e90-49be-8189-49c7950d210f", "indicator--5aa7b8c0-0e94-4c99-bbc1-49bb950d210f", "indicator--5aa7b8c0-b980-4c71-b90d-455e950d210f", "indicator--5aa7b8c0-759c-4e38-9275-4754950d210f", "indicator--5aa7b8c0-4284-4bdb-8a6e-46c1950d210f", "indicator--5aa7b8c0-06d4-45b0-a1a9-444f950d210f", "indicator--5aa7b8c0-ec58-45dc-b7b5-4a96950d210f", "indicator--5aa7b8c0-bfe4-42ff-a1e3-4104950d210f", "indicator--5aa7b8c0-8560-498d-9a1f-4ebd950d210f", "indicator--5aa7b8c0-3b3c-4b36-897a-4bfc950d210f", "indicator--5aa7b8c0-f17c-4809-99d7-4377950d210f", "indicator--5aa7b8c0-2ff4-4df6-aa5e-4a3c950d210f", "indicator--5aa7b8c0-78f8-4581-a89e-49d1950d210f", "indicator--5aa7b8c0-9aec-4349-8674-4bcd950d210f", "indicator--5aa7b8c0-d068-4eaa-83eb-4eea950d210f", "indicator--5aa7b8c0-2bc8-4071-bdf1-4ddf950d210f", "indicator--5aa7b8c0-c1c0-40ed-b42e-46b3950d210f", "indicator--5aa7b8c0-ef6c-4d59-98ba-4383950d210f", "indicator--5aa7b8c0-ca88-4b78-a814-43b5950d210f", "indicator--5aa7b8c0-4b04-49c7-a187-4c81950d210f", "indicator--5aa7b8c0-8210-4397-98d3-422c950d210f", "indicator--5aa7b8c0-eb1c-4100-8ff9-485b950d210f", "indicator--5aa7b8c0-4b90-4f1d-8cdb-46b4950d210f", "indicator--5aa7b8c0-5934-4478-8ea3-4092950d210f", "indicator--5aa7b8c0-bb9c-4b4e-9eb6-4078950d210f", "indicator--5aa7b8c0-70d4-440a-af73-42fb950d210f", "indicator--5aa7b8c0-9458-406f-bcfa-4ff6950d210f", "indicator--5aa7b8c0-4c4c-4c59-9909-48ef950d210f", "indicator--5aa7b8c0-26a0-484b-b5a5-43d7950d210f", "indicator--5aa7b8c0-76ec-4a28-ad8b-4831950d210f", "indicator--5aa7b8c0-e038-472d-86b5-461d950d210f", "indicator--5aa7b8c0-a18c-4b84-be31-4648950d210f", "indicator--5aa7b8c0-fbe4-4b1a-a7cd-4637950d210f", "indicator--5aa7b8c0-5da8-4911-b74f-42dd950d210f", "indicator--5aa7b8c0-33f0-4f56-93cd-4d96950d210f", "indicator--5aa7b8c0-e580-4990-b1f7-48a3950d210f", "indicator--5aa7b8c0-f060-4e3a-a928-4bb4950d210f", "indicator--5aa7b8c0-5194-4f43-b9bf-44cf950d210f", "indicator--5aa7b8c0-650c-4a8a-9304-4490950d210f", "indicator--5aa7b8c0-5d90-4c2f-8124-4f37950d210f", "indicator--5aa7b8c0-74f0-4cce-9fa0-4710950d210f", "indicator--5aa7b8c0-97a4-4bad-b3ad-4c60950d210f", "indicator--5aa7b8c0-84d4-4b97-822d-4d0b950d210f", "indicator--5aa7b8c0-a6c0-4bbd-a5cf-4c97950d210f", "indicator--5aa7b8c0-9f44-43a6-a0dc-494c950d210f", "indicator--5aa7b8c0-969c-4842-bc10-4e5f950d210f", "indicator--5aa7b8c0-981c-4cd2-ad6b-4270950d210f", "indicator--5aa7b8c0-d96c-41eb-8915-456d950d210f", "indicator--5aa7b8c0-6ce8-454b-b54f-4e36950d210f", "indicator--5aa7b8c0-f704-406f-84d8-4fa4950d210f", "indicator--5aa7b8c0-950c-4f35-ad48-4943950d210f", "indicator--3ebecaa7-b9a3-48a4-becf-194625b24f9d", "x-misp-object--be09f3b1-9fcf-4d5b-848e-41fecd41123d", "indicator--b5694caa-9b22-415f-8272-9c57b3eb08c3", "x-misp-object--2b4622e3-ecfd-4e33-88d1-4be6fee2d27e", "indicator--04a11bb7-a841-49e4-b957-a50ff66a07ef", "x-misp-object--da8cc514-e9c2-43ba-8713-65bd1ee4cc93", "indicator--010c6b65-7d24-4eb1-b9f3-161e4bf63908", "x-misp-object--3027a1fa-cc56-4b97-9c23-f87a15628a5c", "indicator--2ea254d8-6356-40c2-962f-e9a22e94b9a2", "x-misp-object--a0e300ab-5db9-439a-a31d-078a28483155", "indicator--7aa4af10-cefa-4496-aa7c-aecaa6ba6915", "x-misp-object--168731b1-b9f6-49e3-8396-e43356f48865", "indicator--c3854528-0d86-43d7-9af1-c892adaa2014", "x-misp-object--e3120171-4e17-469d-87cd-1c3b2214b193", "indicator--32755cdb-a46a-4796-a3dc-8cdac5895b13", "x-misp-object--c8f2386e-a26d-4911-8a45-e5f037add7f3", "indicator--83b23c1f-380c-4c9b-8ff1-d88a0d77e200", "x-misp-object--38764b5c-c154-4392-a0c3-7574c19b999c", "indicator--91f03806-38a6-41c7-bf7b-59cde7114d4c", "x-misp-object--06833811-1d61-4866-b351-c35e84d53f29", "indicator--1862b97f-3ec9-4764-af14-cb1a39e2e1e2", "x-misp-object--0e9a8a1d-4d35-4624-8a79-456fb80187e4", "indicator--333502f7-2faf-4732-9cf8-0b57085db280", "x-misp-object--a0cd4885-4c2a-4471-a8a5-03700ab2cf77", "indicator--3df64f90-91fe-4af4-b4fe-8fd371df1e2b", "x-misp-object--05943cc4-e0ee-4d46-b752-673fd1f9347d", "indicator--73813f31-8277-4a96-abec-99d11d5855d7", "x-misp-object--a9d050ef-1ff4-4906-a484-cf8f3f7cad84", "indicator--7a9ebf88-5d69-41e7-a572-971cb751e615", "x-misp-object--98f9a90f-6b1c-45b3-a027-9837ecbb6875", "indicator--694ccc7c-c1e3-459c-be5e-8bbb60cf776d", "x-misp-object--16b262fe-fc38-4a41-aae1-f7c79a3f2b27", "indicator--7fbaea4b-0ef0-409d-80eb-82e5dfba5994", "x-misp-object--eb32ed3c-79fb-4635-9706-c65725f4925c", "indicator--2bf82666-d839-4cb4-9d62-47afcbabb8d8", "x-misp-object--72530e57-9793-49b0-a161-0078753a7e2a", "indicator--5061f21a-a424-479d-b119-eb03ca72474a", "x-misp-object--9bf45a52-e2d6-4363-85cd-9f1762674618", "indicator--d3f36e32-07db-4834-8c85-432352352e55", "x-misp-object--e89df188-9ef2-4fb1-af1e-7d8990320d01", "indicator--b6089b1d-ce2c-482b-acbd-4940ddf9b43d", "x-misp-object--776e3fae-22a7-473d-8c9e-448f7cebe70c", "indicator--943bbe65-be8f-4fcd-a963-8f40bee18ea7", "x-misp-object--327db92f-c41f-47c6-9791-7cde1d9ce511", "indicator--8a6de377-1b81-4988-9132-ed8d9ecf36ff", "x-misp-object--3ea6b034-235f-44ae-984c-8e5d8e2b3499", "indicator--39755ccf-9fff-4b16-b894-a4742fe0b548", "x-misp-object--84cb6f05-0dd6-4fd0-869b-5051282359e6", "indicator--f2989d98-57c2-4e75-b139-d98f1debcd6e", "x-misp-object--91ba1536-8bd4-4a09-a11f-590dd2f76adb", "indicator--4846a202-a825-4439-a27b-2e9855f3e75b", "x-misp-object--fac91df2-91df-4947-8855-c63df8ea4719", "indicator--e01012ad-efbd-43a2-ae1e-925c8c88bdfb", "x-misp-object--875c39a6-aefb-4cab-8dd1-76de2098bc65", "indicator--170a0ade-9dbd-46a0-88c8-9b9c31f603df", "x-misp-object--ee355cf8-ecb9-43f6-8af7-149019418b7d", "indicator--acaf2fa6-6f3c-4b06-a5f9-3bb31b191409", "x-misp-object--1eb655cb-6991-4136-9a71-5d07c824734e", "indicator--57b549c9-a6f5-4fbe-93de-835d64e5d801", "x-misp-object--1c17f990-5b27-40d9-a80b-e2ff9a10c38f", "indicator--83846430-c5cf-403f-821c-665b6d7d24ae", "x-misp-object--bac69422-8149-4b9b-b191-268f042035aa", "indicator--f7e44f2c-acce-4a13-bb4f-7a8a3f561f6a", "x-misp-object--1bdd2424-ec61-48b5-b0fc-cfe234973c69", "indicator--860df4c8-2d41-4fc7-b3fc-abea9a79399a", "x-misp-object--cd3742e9-9515-451b-9d86-0900994ffe1e", "indicator--f2bf99ab-22ca-42a8-ade9-dd3259513e1d", "x-misp-object--f7a2f44d-913b-412f-8a87-29015a121194", "indicator--3cdbd820-ccfe-4805-a87f-66639a605863", "x-misp-object--d295ca83-4c3b-44e9-bf94-8ea103e0ca84", "indicator--5282a1ef-c68b-441b-b128-7b98762c7db5", "x-misp-object--52b803c3-0c4c-414f-ab7f-61c009b4c3f9", "indicator--ffee8c30-fe29-4c86-9b73-30c567bf8611", "x-misp-object--6d666a98-8722-41c6-951c-010645d867ea", "indicator--8e10aae3-e3c3-4fb9-8871-64897fb41a12", "x-misp-object--51bf0041-0608-40d2-a4b8-dac196a75558", "indicator--2a95ad9c-9614-4175-9c77-307846c62223", "x-misp-object--1c9db02b-c9a4-4f2d-8e66-4d1116798eb4", "indicator--e709461d-0ae6-468d-87eb-63960bd22851", "x-misp-object--30dce96c-9cdd-40ea-8945-b106b9b4a3b2", "indicator--21ebf0fd-7772-45af-b54c-abc5df09ea6f", "x-misp-object--90930896-570d-4f08-9767-9299e3e25f8c", "indicator--db0cef85-c247-4270-a64b-cfc6208435b7", "x-misp-object--617a92ab-8635-4f5e-80c9-a714809d0592", "indicator--73918517-e510-4af0-a019-bf2bee56493f", "x-misp-object--49ea5f6c-b55f-42f9-aa76-b9d21ef849da", "indicator--aef2b037-4ed7-4588-8cde-a018c637147c", "x-misp-object--a3c0c9b1-aa83-4af5-be53-f932ccf256bb", "indicator--62d5dec4-9817-4b1a-bb14-609a1b6758a5", "x-misp-object--629868f3-c236-41a5-a066-de88f0bc5754", "indicator--5453664b-9768-452f-80d9-b9a02391183d", "x-misp-object--588bfd9d-f8dc-46b6-8229-c99a0a18fa93", "indicator--76e97e10-38c3-41c9-a84d-5614621238d5", "x-misp-object--281801c2-274e-4e56-9cce-7547583867fd", "indicator--993c1778-6454-40b9-bf98-e2c2993d751c", "x-misp-object--99fd2972-6ddc-4f44-86bf-cf3cdee3d8dd", "indicator--629083e5-c228-4a5f-ab26-905d65f29816", "x-misp-object--30fc814c-16cf-402d-8af4-b1b42f1f0670", "indicator--973eccaa-c84b-4e8a-acdc-20fb1cced3d0", "x-misp-object--3bc155aa-8c8a-4ad9-a170-238d59cd6423", "indicator--9669a60a-a564-40cc-90f3-6a0619ddf84b", "x-misp-object--7472369f-9901-4c09-bfb1-244c7d70e65e", "indicator--f9456adf-90ba-400d-ba2a-f34cd7f929d0", "x-misp-object--c51d359b-36fa-4a3f-8c24-f31adb564a9a", "indicator--eb54ed4e-6811-4c83-8aee-c334fee7214c", "x-misp-object--4966f0ba-fea3-4837-b833-8f9a5d41d38e", "indicator--5f4d9667-75ad-4a32-9e13-ad54428acb2b", "x-misp-object--a91d690d-70d7-4949-bfb0-6067f001a596", "indicator--9041116a-b6b5-4d5c-a565-d6178035272b", "x-misp-object--848f6b87-3abc-4578-a29d-3d36b95393df", "indicator--9f28f790-484f-41c7-98fd-19c53a5784ad", "x-misp-object--ccefa011-af8a-4a21-ae83-32e24a2bcf5d", "indicator--20a1faef-5b03-4328-a877-a6d9ecce874d", "x-misp-object--d3df38dc-94a4-490a-a393-30f28bb71c2a", "indicator--62f011a5-158a-4e17-9274-373a8afa7f89", "x-misp-object--fd076d81-b315-4442-825d-b43dd7931e58", "indicator--2910e51e-9648-4e47-afdf-a4e987e19b36", "x-misp-object--de7ed8dc-8696-458b-bb57-f9f9108072ec", "indicator--d1784ba3-1ef0-4d79-8079-c9dc92251090", "x-misp-object--122ea312-54ee-42c9-9246-5a1b4c5d6e9d", "indicator--f30501a4-1ca7-4609-957b-15efbfab4c35", "x-misp-object--d9686b2d-97a4-4279-908e-a465007070a0", "indicator--6f94cdef-c5a9-409d-9fa3-8a13133ff47f", "x-misp-object--4012a76c-de18-4390-a286-2c83696b393d", "indicator--4b6c97d5-3fe1-4419-bf6b-f179e663bcd1", "x-misp-object--9fa6c908-2ff0-4298-aa58-9fed29b6621c", "indicator--5f5a9bef-cbc2-4048-a584-02fe6b323301", "x-misp-object--d4ce528e-6e53-4462-8b4d-bf43bcf7a122", "indicator--3c44b011-cea0-49e8-b582-fad55d1d8af1", "x-misp-object--d9f6f916-1093-437b-9010-23a6d7ba2770", "indicator--262143f5-8e2c-48f0-a7ff-98463168dc27", "x-misp-object--b1bd6e18-7266-4a67-b549-1177d939703d", "indicator--4778b0bb-ca98-4bd7-8f8a-5d408f3cff9e", "x-misp-object--4006abea-7694-4809-ad2f-f5b1d0b8648a", "indicator--c8f23cd0-337b-4520-b4d3-c7b053601507", "x-misp-object--17da1ccf-d4c1-4428-8404-8d3659d59793", "indicator--b01eed1e-c2f3-4a55-ae9e-c38e8d385f0a", "x-misp-object--b544c25d-094a-4b2b-a6dd-14b6ace52836", "indicator--7fe8a7d6-0855-42f6-9a14-b2824acfb3b4", "x-misp-object--42755064-ba05-4f91-b78f-689be27b717e", "indicator--7515eaf4-b764-46a3-b4bb-a9dd4669c17e", "x-misp-object--fc459030-58b1-4629-8287-71eb17a46f1f", "indicator--0c710fd7-5c24-4156-80af-9ce1133f1b34", "x-misp-object--59ee90d1-bae4-42a5-9686-5f2ad4cb8007", "indicator--1f4e9c0c-d4b9-4b41-b50e-95a86e12635f", "x-misp-object--c60414fe-d8a1-485f-b326-ec39137346c4", "indicator--772a44aa-5648-43da-ae46-a43b0e51dede", "x-misp-object--8076f407-c7c6-42e5-9901-5ea7dca9e02c", "indicator--3842366a-678d-443f-83ba-e2523a409506", "x-misp-object--0c7561b8-109e-4cde-85ee-0c5ceaa66987", "indicator--6e33ec1b-4c4b-4ff2-9df3-e0ef2cf0d557", "x-misp-object--68bfceef-61e7-40b2-8baf-9191f74d200c", "indicator--b41008c1-0bec-4725-b8fa-fb41541dedc0", "x-misp-object--e7aedbef-df58-4fa7-b32a-34eb2c0ed4e5", "indicator--a0ff86b1-25e6-4093-8971-dccc063f05a8", "x-misp-object--724bc7ba-ba88-4e5d-9c40-7676621f8735", "indicator--1373fe1f-de01-4475-915b-6851db2f39e4", "x-misp-object--fc7f1e60-0b74-422a-809b-d51ccf402c0e", "indicator--c45f14db-dfbd-4555-b390-2276e6ff1ad2", "x-misp-object--fae7c364-8729-429b-9ea9-3b31af0f3ea5", "indicator--56a2d91c-c23b-4c5e-b2e3-921244e87225", "x-misp-object--1e6b86c2-a47c-487a-9f37-325383622e1d", "indicator--6d17c059-317b-40e2-9085-4f8286e2d10e", "x-misp-object--00d27731-8a04-43ba-944f-d93082b05bce", "indicator--a5a9364c-78a9-48e7-9960-74cafd72c762", "x-misp-object--8812bcfd-652a-48f9-8ce0-d0859f8a7d74", "indicator--cfdebb5e-9bed-4110-91e1-967541c218d5", "x-misp-object--088a12ae-cb7c-4e19-bf34-de6c31c42421", "indicator--8cfdb710-e0eb-4aa0-be7f-4bef7c057f48", "x-misp-object--50d32b71-58f6-49bd-950c-8201f8c8f6a0", "indicator--0ee0151f-da7d-4d9f-8d67-74dc297b1ac7", "x-misp-object--afef20ad-8f41-41fd-ab24-c13d4bb81db2", "indicator--66c51f09-728f-4bbc-a2f0-8fd2dd9ee34c", "x-misp-object--94c29569-4c2f-4eca-83ea-71b34b2f04ac", "indicator--8ba4601c-07fc-4c31-b409-70f55daec9da", "x-misp-object--e0e6c464-9727-4e62-99a8-d2d896ef3be0", "indicator--c7f95bca-d452-4ca5-b2fd-81284eefa29a", "x-misp-object--95bd6a8c-2c13-44dc-a176-04b903e55468", "indicator--895e6d73-cc04-4d7d-a74f-1c79d68cc85d", "x-misp-object--ba96f218-b01d-4fb3-986e-4a4b129d501a", "indicator--a18a3d72-f1c0-40f0-9281-25c93d8002c7", "x-misp-object--d673e058-bd6f-4588-b64a-5f26648b833f", "indicator--1a981d65-59bc-4a14-81a1-008f4c77159a", "x-misp-object--ad7412ca-ba99-4dc1-9098-1b14d7898562", "indicator--f6601087-35c3-4239-85b2-25f4a4c9c1f0", "x-misp-object--f1915336-fa1d-4500-931f-5368fbc727d4", "indicator--abf60cec-d36a-4744-b7a1-a33e5763a9c4", "x-misp-object--32ea0688-10d4-4123-b4c6-d68fb5cc55d4", "indicator--a8aecb74-f7d5-4f56-9dc7-3c00ba2f4b0d", "x-misp-object--f355561d-a7fa-4896-be8c-1f8274815354", "indicator--a9d8f073-dd7a-4e9b-a0a7-04598ce32926", "x-misp-object--10380065-18d9-4ca8-8cb4-dad38fdd929d", "indicator--7638c728-3089-4a20-af0a-b37900bc1f1d", "x-misp-object--86f66db8-becb-45ae-b0f3-e3340cd5d19a", "indicator--7f886d78-e6f7-4ecd-8828-e9693e314aa0", "x-misp-object--0f3c8eab-f129-49da-9ed7-cc8b7f1b09f0", "indicator--51f66ea4-bd23-495b-be2c-64962e187550", "x-misp-object--ff35fc80-aed9-44b8-bf9a-04ae04bb9b29", "indicator--93cdfd6c-153f-458f-8b4d-6d3eea4d85fa", "x-misp-object--25d08574-096e-4a9b-b9cc-e292aff3160a", "indicator--d2244ec7-b833-45ee-b46d-46d0eb8821a6", "x-misp-object--0dd974d2-228a-4efd-9c80-5c3ebec6afe2", "indicator--a252e7e6-4210-4a0e-af70-808685490bf0", "x-misp-object--3fda77bd-6a6a-4fdb-a784-0569bd5b8bc4", "indicator--652791f2-58a3-4bc2-9127-eee90e5777fc", "x-misp-object--245b7bed-15e3-4235-86bd-27e0d9bc6c46", "indicator--bd4872e3-93f3-4a82-85ab-0fef4dc1a473", "x-misp-object--47225078-5904-4fc7-96ae-03e630f628e7", "indicator--7724b584-9fbf-4690-8824-571ca40e8647", "x-misp-object--a9700a79-b809-4626-9a0f-1b5e30547578", "indicator--eccc55d5-a165-4f16-8dba-993df6d0c16d", "x-misp-object--c14e1628-941c-43c0-81ef-0b8bf8e8db3e", "indicator--da83d80a-c5b2-4f00-b78f-bd6cea6c47be", "x-misp-object--e7be8927-c465-4b2e-bfcc-68a41eae297a", "indicator--de30c258-e3ff-4103-90f0-66b263006c0b", "x-misp-object--c9f224ab-0c81-4deb-9160-85f96bc624c2", "indicator--e4f6dfdc-fb92-4812-8c6d-91b7548ebadf", "x-misp-object--f83784d1-6a08-4009-a46e-4aed15ff5dee", "indicator--5a0cdfe2-1650-41fa-ac1f-99afa14cc188", "x-misp-object--b3785c90-1c5f-4739-8cf1-31e946583359", "indicator--da10673d-4b03-473f-943b-e68b51a49372", "x-misp-object--c0f2a053-934c-4be9-ad1d-7249dfef9301", "indicator--cb0ffcf7-6e1a-4bc5-b72e-b1c50a4c072a", "x-misp-object--c0d442d4-72b6-47cb-b4b8-18744a4fd84d", "indicator--4272cdd1-73f2-4b9a-a8b5-64d3a1d7dfd0", "x-misp-object--857ca1d6-7992-4e86-9a8a-9baf9005bbd9", "indicator--2f2d7190-59a8-4a22-b2af-ac312b91bfe0", "x-misp-object--df56eb90-6fe6-4dc2-86c7-0c1134d65812", "indicator--2701b8c8-6625-4f06-a88f-c78f56165a61", "x-misp-object--9f4f8732-0f86-487d-b2f5-1d2d89aef0bd", "indicator--93b95f15-4cb7-419f-841c-450ac3d2fcf6", "x-misp-object--048e1c5f-6a94-4dd9-bbf7-eda1802b6d9c", "indicator--be1441ae-b2e5-41ed-abdd-414809f6352f", "x-misp-object--3741aec9-519d-4649-ad8a-549d2450e256", "indicator--f231a6ea-f8b4-43f8-adac-96e31854da2c", "x-misp-object--e5f7cc1c-cd7e-49f5-9d23-96945164180e", "indicator--f9a65653-53de-44fd-a416-29aeb4cf5f1e", "x-misp-object--19789499-f9e3-4415-afb9-7dee60e37880", "indicator--091a7f76-14d6-48df-86fc-76bf406a81a9", "x-misp-object--fc99724e-fb1c-49c1-a876-021d95449e91", "indicator--edc558da-e5d9-484e-a89c-2d4286e33de7", "x-misp-object--a567af95-f7a3-4bf2-baa3-270f681e5322", "indicator--ad876176-ecb0-4443-a1e3-3474fea95c7c", "x-misp-object--4c0aa304-4439-4634-ab20-fa7a819e4cfb", "indicator--27853edd-8b95-4a9c-8fd5-256adb3e5da6", "x-misp-object--4a39f8b7-6642-4a32-aa2c-511de3de0ae6", "indicator--63998fb4-3796-4b69-bbb5-c786f85c6e24", "x-misp-object--77335a35-58f3-4736-8e65-9d43eadd3255", "indicator--f501ee7d-5468-4059-a745-dc1f392e6a44", "x-misp-object--8482a386-b5b8-479a-974a-219fe749b1ab", "indicator--ebfa55c6-2e68-4f35-a2f3-060799e22095", "x-misp-object--a3bb6a50-5123-498e-8f1a-6923b54b0b35", "indicator--2316025b-81d4-4611-8420-62597b2163f7", "x-misp-object--436f3cd9-f66e-4d35-b0c3-ba8c39c5a0c4", "indicator--dc57f819-a4ca-4824-ba9d-e6d0e9f78b9d", "x-misp-object--37f56d93-b168-44cb-90c9-e245c6eee85a", "indicator--4f1fd255-9d15-43ec-a8b6-5fdf0abbd1c5", "x-misp-object--18efd0c2-3813-4e9f-bf69-330dea779353", "indicator--8f789d00-5c20-45f6-8091-834ea7f79fcd", "x-misp-object--74d6bbc6-5b6e-485e-b40f-e0076046c307", "indicator--318e9442-266a-42df-9bcb-57af40dc6fee", "x-misp-object--9f4cb389-a3be-4918-8887-595689e68ba0", "indicator--6212c88a-a171-457e-bce5-e495cb75bcd6", "x-misp-object--8d1e8e66-f43c-4d3f-8b88-326769b2dadd", "indicator--b564d217-c2db-44d8-b069-916f0fee7fc7", "x-misp-object--2693cbb3-ac2c-476e-a4bf-b199c7e88878", "indicator--3bc0a925-001a-4ec0-b662-c6ffdfa883da", "x-misp-object--9c4a8abf-36e5-45f2-9950-acb6fc6d6d8d", "indicator--de573c2e-d1b7-4454-830b-ee0de6ffebe7", "x-misp-object--2b361753-16d6-4b91-aa83-2241be1c2111", "indicator--f845f0d3-8a14-4cd0-ac52-b68a45ad6bd1", "x-misp-object--22ac03b3-05b2-4cb3-b1cf-06a04d09b191", "indicator--b7dc6423-6d05-411f-ab96-1f5fe5bff960", "x-misp-object--99910c76-477b-4cf0-bae3-dd9aabed6f4c", "indicator--db1db06e-a0ec-4bb8-b529-d8eb867e24c4", "x-misp-object--5fc6ede9-b781-4eb4-8c6a-a47a025901ef", "indicator--42066cdc-d515-4c5e-b536-6403bd2fa1b5", "x-misp-object--869f01f6-7bb3-44b4-bc9e-8b736da289fa", "indicator--b2a4407f-5430-4c80-bf8f-507f234cdf38", "x-misp-object--081ea566-bd34-49d7-be26-ccbb3ad585d1", "indicator--4baac2f7-b640-49ea-aa37-60ae3a4b7e66", "x-misp-object--93f77b86-ed4f-4313-8c22-6010b7795a8d", "indicator--7baf9480-e568-41e6-a1f1-fff7d516fbb1", "x-misp-object--b8d85b22-76dc-4882-85ac-0fb0f74b754f", "indicator--70733fd0-6c28-4129-980c-8ff97d139d43", "x-misp-object--808e6a5f-a93e-48f1-8678-d5f32b61f516", "indicator--86a9886d-1f0c-48e5-978c-8f96df99efed", "x-misp-object--980fe535-bfc5-45db-979a-1c6e45bfa4b4", "indicator--991239b6-a59d-4891-9365-3297334f53b8", "x-misp-object--e5931a6d-c9d6-4c85-9184-45c54d0896e5", "indicator--af070041-9ff6-4592-b8f9-c8321cb360ab", "x-misp-object--3b6371b2-89d5-4271-ada4-05f54fd4ceb7", "indicator--e518371a-6ff1-4160-86db-52fd485c75ed", "x-misp-object--16b70a36-22ec-44de-9284-c8513068cae6", "indicator--774d6ed8-303c-4a84-935d-f3ac619f4e8f", "x-misp-object--dc1da038-6340-42d1-ba26-176fe9bcded0", "indicator--f6f9fee4-876e-4765-ac1f-923a8e449811", "x-misp-object--6c106bd5-9842-4461-b8dd-0faa223d2c68", "indicator--ef7ab321-e2e2-45d6-a76b-ed61d6ccbdba", "x-misp-object--fccef241-584e-4a8c-bcac-44550ac946a0", "indicator--972390dc-b051-4c4f-952a-2daca6c94e2a", "x-misp-object--6d2857f8-cde7-49a7-86f7-27711cde2de0", "indicator--6c18de88-4e54-4aca-8333-7b6002fc6581", "x-misp-object--3fe466f9-e2a4-4cd9-85fe-b5985c458e79", "indicator--c0777536-9c34-4420-ad25-8a811bf2948c", "x-misp-object--eeac1674-b2c3-403a-af56-098d62b62f9d", "indicator--ad0bbb06-2204-4a91-a97c-85d1f2c8bedc", "x-misp-object--c511bbf9-ee03-472f-9275-86e54f87e603", "indicator--181cb412-06ff-42e2-9e5c-f3b5a7f11780", "x-misp-object--d09085d8-c050-4efa-8e91-586e9207ef3c", "indicator--7fadae6d-0f96-456c-8717-ce5168fcd964", "x-misp-object--5978498f-332b-46d5-ac8b-5da2f33ba5fc", "indicator--84d40159-8f0c-400c-8d61-34ea3ee11fd5", "x-misp-object--fa3049b4-4fb2-4010-b3d6-df251f5e601d", "indicator--97613f9a-68d6-4e2b-92a4-99963309ce91", "x-misp-object--be1dbba5-f49d-4dc9-b130-19e084d25584", "indicator--9850420f-b885-45a9-a6e2-af2380c164a7", "x-misp-object--09920e57-e715-4c54-b158-9a9ee4b11723", "indicator--e4a8088c-bb92-4cff-9775-8f2369d9c9d7", "x-misp-object--5850fabb-73d0-4f76-a406-a6f7e27b0b09", "indicator--e60f450e-6f03-470e-9126-dc098b8138a0", "x-misp-object--eef7f7bc-bb25-4b04-9930-1d76137be36e", "indicator--110e5750-cf74-4fe0-9af7-59757472d6e4", "x-misp-object--c2a69426-1e1e-4522-b6dc-a3833d75a33e", "indicator--60afce5d-2b5c-4c36-ab17-ab9544a2744e", "x-misp-object--b80f6804-4169-4522-825b-985b9349fabc", "indicator--20408dac-7c98-4bcf-bd33-a53de3436da3", "x-misp-object--9a547937-9c10-4da0-8147-fa1e898ed8bc", "indicator--b9ebd188-91d8-4229-8b64-13d8daa59f3e", "x-misp-object--d6008b30-2b4b-4d67-b609-7d7a5604ab1d", "indicator--682d3605-86dd-4f7e-80f2-a99ad1dd4e70", "x-misp-object--d94c34c7-d78d-4d62-82e9-911bc6d298bd", "indicator--1a99a2de-2373-4621-a8fb-3810a2d1e0b3", "x-misp-object--1d9c8849-48b1-4c5a-86c1-23c30aa5bd85", "indicator--98b8fd89-339b-4f7a-ab5b-9c386741f7f4", "x-misp-object--a255438b-ec32-4257-8de6-dc7a054f4126", "indicator--639a5e0f-c87f-4c39-bb1f-0443c6fe085f", "x-misp-object--b70cf9ce-61c3-4cc0-84d1-d2848d3e98e8", "indicator--baf077d1-6aca-4cbc-ba3f-33bda3b9411b", "x-misp-object--712481dd-995d-491f-b929-5e3322c631ec", "indicator--13d8d248-26dd-4144-a295-f5359295233d", "x-misp-object--2a7d70a1-7b62-4ab4-8e52-eb2580366dfa", "indicator--be3b992c-a86f-4e3d-a44b-1e319fa67c66", "x-misp-object--34447c7d-838f-4cb6-b8d0-0a9f0a0af702", "indicator--2bd8f5ed-adf0-45ff-ada9-9bed3a4060ae", "x-misp-object--ac8f6787-b5f5-4ee6-b1a0-0b303f34ab29", "indicator--c41a3658-a663-4d02-96a1-31891e0a2b70", "x-misp-object--0bdb8b75-3f37-4741-b0b9-5c45ed8f0468", "indicator--d68f2720-4b5e-4632-a07c-161efaa36753", "x-misp-object--62a200f5-ada3-489e-8be4-0f841b49ccf1", "indicator--2d4e2c18-2028-4f1e-a670-a518a678dd03", "x-misp-object--9e3d433c-19c8-471a-a95e-f645423a88c3", "indicator--1656bc8a-bb59-41ee-b95b-4d8c7709675b", "x-misp-object--93704ecb-f463-4722-92f8-61dea8ddeb24", "indicator--cf0a1d5f-2e78-44fb-8ca1-850ba3b02c9b", "x-misp-object--ee2d4946-ea46-4614-929b-b892f9908209", "indicator--ee5ee3f3-5de5-420c-a078-ecb7b097731d", "x-misp-object--db8dfdee-1040-4e3e-9c50-bafef41f9cd8", "indicator--0b5f6c32-9395-4cbd-a0bf-dd0d0530e2a8", "x-misp-object--33eda59f-9e49-43f3-958d-a55e2a6f1166", "indicator--c1fb6054-0e84-4bb2-a205-389fc558673a", "x-misp-object--40779d2d-1039-423f-a494-825d7952460d", "indicator--e77be68c-627e-49ae-97d4-e0905966779f", "x-misp-object--e15aae65-2ce2-4bf1-bf9b-bf0b5f6a4b42", "indicator--4d96769c-72ab-4627-b0d4-d0340cd5afb8", "x-misp-object--6a64e291-db27-4ab7-a4f1-d219c2d4a213", "indicator--03ca8515-5a71-4777-af1a-d1ff1d6e5a8c", "x-misp-object--0adc6624-4217-4fff-8afc-70515da5eb04", "indicator--b842ab6c-0657-4c07-b5d6-7d84cddd0db5", "x-misp-object--41092416-53fd-4ebc-9dd7-c561b27c71d3", "indicator--501eb9d3-d927-4981-9a70-029446f915cc", "x-misp-object--f7f485cf-39d2-496d-8559-26ac32cf9a49", "indicator--471a7dbf-92c0-465f-ba18-05dfb063b09e", "x-misp-object--df430360-e730-4f9f-bc3e-686429c7583a", "indicator--f01594da-861d-4f87-b396-47514fa8363b", "x-misp-object--0b79ea19-b0d7-40b9-8776-a2a016033403", "indicator--dfa0759a-c600-44e9-9876-9917c0a250b4", "x-misp-object--5839cd4b-1637-4bb9-bb4f-d47ebed941c9", "indicator--6b548802-ebdb-43a5-9401-d2f8f3028d08", "x-misp-object--4d3b0767-ca9c-4a59-b2b6-6b5d45774032", "indicator--bb56a8a6-e4d3-42d0-833f-e4361b54331a", "x-misp-object--4d05714f-a5ef-4d4f-a006-8f30c4f980b6", "indicator--1830e8c1-fd3c-4bf3-a1c8-62552d336b81", "x-misp-object--8dc0fa9d-8101-4cfa-a7ca-708ad1e8641b", "indicator--0f99173c-5e8d-4184-9112-90283901d5a7", "x-misp-object--8f9ecfd9-d95a-4499-b479-443b63588110", "indicator--34be655c-ccbd-4123-b790-0e89cdaed85d", "x-misp-object--86b97a0a-ae05-4885-9931-5adfba823b6e", "indicator--2f9ea31a-b956-4e72-9a09-e16343cfbff6", "x-misp-object--c298d324-80ca-47b6-839a-8194f675280e", "indicator--4b8152a1-9434-45eb-b87c-1e63940242d9", "x-misp-object--3a193c9f-2212-4f1a-a4c5-4ad4c34c83c5", "indicator--8d352130-43c7-45ed-8071-f107683e85e2", "x-misp-object--826f69c0-6353-407b-959a-6db753aa04cc", "indicator--20c88590-7576-4c24-9aee-62d7609cbe8f", "x-misp-object--e3268eb8-ff83-4c94-a785-62496de9011d", "indicator--b138ff77-a9a1-4c08-bafe-29b0523b4ed8", "x-misp-object--633551b4-10c9-4b6f-9016-48b408fe38a4", "indicator--d66b5ccd-9abd-4f3c-9568-1d70c53d9bc7", "x-misp-object--e778b89e-a884-4832-abde-6ce011251693", "indicator--0892831f-a928-4d72-8fce-54a4e11fb7c2", "x-misp-object--c1f6c155-6147-4028-ba1b-a80b9dd7ba04", "indicator--db1caacc-9b02-4c97-91a3-e53e3e1a06dc", "x-misp-object--43e01f3e-90be-425d-8ec7-de09b4b709be", "indicator--67b2d93a-98eb-4c8a-9d16-4ad49b550d26", "x-misp-object--3df48692-1aae-44e5-ab1d-8e3f51964c1a", "indicator--ae30abe7-aaf5-43b8-9a86-da761337167a", "x-misp-object--c8abd4d3-60c6-4618-844a-b449f10e295b", "indicator--020da26b-fa49-4c8b-8c1f-1e9c9720417a", "x-misp-object--4b92ac74-45c4-4016-834b-d2bea2aa65e8", "indicator--bcfb9a53-5b69-4ac4-a2ef-18fef63ea165", "x-misp-object--e49d9375-8dd5-4055-89fd-07955351f316", "indicator--c008b064-faae-4e2d-b895-7a3386442500", "x-misp-object--6b181382-5e85-4d8d-8841-f7d56ba607a5", "indicator--a1d90f3c-1df4-47d6-a972-60df22e745d9", "x-misp-object--6477d441-4a92-4916-acd4-43b19d16a375", "indicator--83c71c43-77bc-4dc1-9ac8-164993129370", "x-misp-object--1e276f55-5833-4810-8bfc-bbf15fb87297", "indicator--d66b49cb-0f4e-4fcb-8233-a006348455ee", "x-misp-object--b7668932-8d26-4ac2-af13-2ed08885bcd6", "indicator--e9d100a3-05ab-49d1-b1c9-0e8f2383befa", "x-misp-object--b35d1dc0-4300-4cc1-902a-5d9b046400df", "indicator--fe995598-bd9e-409f-8ea4-c08712c1b9de", "x-misp-object--10484feb-f108-437b-9229-acfc6b10217a", "indicator--ed1c5751-bee4-4a8c-97d2-a0073741bbe5", "x-misp-object--72f27ad6-4f8e-4276-b7fd-287b9d809f48", "indicator--42a8a23c-9b54-4482-8a50-046820505d98", "x-misp-object--5fb36872-a865-41f8-bb2c-3aa9e2706869", "indicator--7ed9d6ef-d823-437d-8281-4c9949d2b6b0", "x-misp-object--7f6d2249-26cc-4a41-8db2-19b133559d95", "indicator--9495bd5e-39d9-40da-951a-008a0f307829", "x-misp-object--7a0ea506-37ef-4646-97d7-5574970b30b6", "indicator--2f57ac50-c7c9-4a20-b794-a714dc18fd80", "x-misp-object--43401fe1-3ad8-4d5e-ae34-03c4e6b1187b", "indicator--174ec337-9a50-4f85-8127-3a95078ecd00", "x-misp-object--9e6aba26-4bc6-4749-9af1-5e33710786ba", "indicator--d60d4a1a-e213-4e2a-a245-02347da28512", "x-misp-object--87acea24-f544-414b-9337-4aa282031caa", "indicator--7f797fe4-795e-4152-94a5-ca85ad81e2e9", "x-misp-object--0df2e9df-4106-48f7-9f4f-6bf91b431e11", "indicator--46998b72-d9b5-4392-868d-0c843d34fc00", "x-misp-object--f98f0864-6f07-45b0-b0f4-0c88c07dffb0", "indicator--80685b00-a882-4132-9551-286ab3b430c2", "x-misp-object--bbdca7b6-37ed-4ae2-aace-f71b4c8ac0c0", "indicator--2f15384f-e5ea-4e02-851b-9ecbf3508149", "x-misp-object--f1bdcb12-3b65-4f80-8ee4-063b9b5b66f7", "indicator--2b0031ea-445e-4619-98be-8c0059ec1b62", "x-misp-object--3bbcd9ed-3e47-470c-b431-e70443010365", "indicator--9a1ed464-4795-470b-820d-77ebba0fd9de", "x-misp-object--8e4dd566-7edf-49a9-8dc7-294cd59c3b80", "indicator--436515ee-125b-445a-b9bd-0326cc980910", "x-misp-object--7b789516-52af-42e3-a4d8-402725bebbad", "indicator--c18d5005-8d30-4b08-8b79-5471964d2686", "x-misp-object--aad037d0-ccc1-42ad-9e22-b00255d02d6b", "indicator--f21c8928-a0ce-47df-af6d-1dc4800e6684", "x-misp-object--092b2e56-e71f-407e-ae75-1048d5d294aa", "indicator--26ed6d13-7ede-45a0-9d75-8484cbe26f82", "x-misp-object--3bc35d8c-6cd4-4946-bde4-deae4dae2192", "indicator--a378e561-df52-488b-8b61-9c31848fd405", "x-misp-object--5d9c9579-9bac-42fe-b4d7-d2c99c2e7f26", "indicator--1fc063d9-da6f-49e5-9aec-04541560882f", "x-misp-object--c66e9d99-b3ee-4276-9bc4-e16197dc1343", "indicator--a2d020e6-f709-4ed7-9c48-90d666c9f95b", "x-misp-object--164fe582-c64d-4e47-ae0d-a7dcd9ee6410", "indicator--d012ed78-ce5b-4169-9631-e80bd8e8f78e", "x-misp-object--039c4cb6-78a0-4ee5-89c2-4e3fbb5d9db8", "indicator--f0892f76-ec4f-4948-b54f-a7e56ee990ed", "x-misp-object--90685d7c-a0d2-4413-894e-7c1d95f10924", "indicator--e55e7446-e0ac-4f7e-b4a7-7de1d3a96e50", "x-misp-object--9c601eec-34f8-4883-ad4c-991beb9c5313", "indicator--f1bc257b-1f9f-4ffe-86be-35ffd892f3b0", "x-misp-object--c7bfc277-b689-4282-a52b-723f92964fb0", "indicator--b9b8ff6a-80a9-40a8-aa1e-000583538507", "x-misp-object--bc28e52a-d2b1-4db5-98b2-b78814197fd0", "indicator--5557a9c2-2926-4aa6-9091-3871ebd874d7", "x-misp-object--7888f078-6e6f-40d0-b426-fbf99c5e25ce", "indicator--d9764fb8-d509-4b1a-9b6f-434bee32f6e3", "x-misp-object--99b98df2-668d-495e-b127-d171c1d9d3c8", "indicator--64348811-02d2-43c3-a49e-65a3d4491dcb", "x-misp-object--521302dd-bf8c-4040-a8f9-026216bf0ada", "indicator--56e47645-eac8-4997-a5cf-32192544f4ea", "x-misp-object--f6103ca7-a9aa-454d-be10-d6fbc27699f1", "indicator--31f4b6b6-e16e-41a5-9f5f-d451220d62f3", "x-misp-object--2ae0b87d-3b07-4a7d-a8f3-280f94879967", "indicator--32d62c01-a77d-4a61-91e2-e479232e89fa", "x-misp-object--f4223054-bc53-4228-92bf-02380266e4d5", "indicator--bbeb2a80-fffe-4959-a634-6d1b92c27966", "x-misp-object--68c69bf0-47b9-4ea2-8531-239821114309", "indicator--fe568963-2dc3-417b-99e1-5ad9a83f40db", "x-misp-object--df245559-1f77-4c8e-b92a-873b30f1c2d5", "indicator--18dd827f-22e9-4c33-b517-6cbcddc95a21", "x-misp-object--e6a3fa3d-87e2-45e3-af5d-d6991ae8e074", "indicator--bd8efd15-6af3-43ba-84c8-eac4769883cf", "x-misp-object--618d429f-6a91-4bba-892a-c719cf60cea3", "indicator--277f3ee6-3d34-4038-abcf-2499c69b02ce", "x-misp-object--f4efd30c-0621-4634-a2ec-478ab941efca", "indicator--9478791d-a2ed-4bbe-866c-f36e552defdd", "x-misp-object--837f0b81-3cbb-419b-82d8-2bb5de26578c", "indicator--25ac76f6-4ab3-4d15-a4e4-4c5536e0520d", "x-misp-object--b8393ac2-5026-481f-82f1-db6fb4b48d28", "indicator--1270a24c-137d-42b8-8bb2-f327d09c62d1", "x-misp-object--0bef6eee-e08f-4405-9ffa-7b98518e0fae", "indicator--44a433bd-8cfe-4150-ac8d-16ca5a4982fd", "x-misp-object--5bfacbe9-088e-452b-864b-e4e0071f5dd3", "indicator--b80818b7-46c2-41f2-8274-9bd66c2441b3", "x-misp-object--b55faed7-7aa6-460d-885e-2c47abff9462", "indicator--b1f1d953-5872-4004-bd05-9fa658e326fe", "x-misp-object--dd23efa6-454b-4338-82cd-ff495fb2b32c", "indicator--a20fd02a-a3bb-45a2-9cdd-537570f9d775", "x-misp-object--9dc0eda8-c956-43e1-8bc4-5c88a5da9d9e", "indicator--2e2cb479-1811-4020-91b1-64206c1c3bf9", "x-misp-object--a681ce5c-c6b9-4dfa-86df-b14f736d5727", "indicator--ca040b60-0f2e-42d9-9503-73c4fe312591", "x-misp-object--4c3be041-e873-416f-a301-ac3f2e8ba8cd", "indicator--41cff4ef-ba06-42ac-a0a6-01e30418969e", "x-misp-object--5f59b1cf-7051-497b-85ae-26bb254d7664", "indicator--1f9b7984-58b4-4bdd-9b7e-c2782de29504", "x-misp-object--9c900612-9431-4577-8580-6099cfb0e4d4", "indicator--a731aeaa-5c51-454a-8690-3c7622717b8c", "x-misp-object--dbba2e99-1c39-493e-b7f1-5e50c4b677dd", "indicator--17f52d1f-c8ce-45c8-996b-38d624db86c9", "x-misp-object--f48c3488-0954-4be2-972d-05c233558f73", "indicator--ca0e53e1-d879-426b-9b6f-a60fc942957a", "x-misp-object--85d876f7-0257-4977-9817-d92fe656f507", "indicator--c95b1e9d-e2de-413e-9ffb-4b87f049250b", "x-misp-object--83fe5578-3bef-44db-a66d-be68a3cbc329", "indicator--06e88af6-9100-4e50-aed7-494831bf2a2a", "x-misp-object--e24a4551-324f-44dc-a13f-3fea25676610", "indicator--59eda1ba-179f-4293-bd44-50871517d08a", "x-misp-object--d834c18d-a902-4c28-857c-4a0da7c92148", "indicator--a2c02004-e597-42d9-8a99-a8e678e68dfd", "x-misp-object--d575295b-27a7-4e8d-ae64-606955c6bcc7", "indicator--becac4fa-8cc6-4b3b-823f-cb2f413a18c8", "x-misp-object--34023aca-655f-4916-b588-65ed3f78c8cc", "indicator--df145429-2ca1-436f-b388-10fa744f43db", "x-misp-object--6c998244-f800-48ff-98d8-3f232c8f21c8", "indicator--78f1fadb-c0cb-4ea2-8aec-0c43d2f960e0", "x-misp-object--a0a0caae-59b2-41c5-b073-243c37515fba", "indicator--b1adda64-9a8b-4634-8e63-327e75d42eb8", "x-misp-object--f7b56700-8e0d-4fb3-9a59-08cef7c60a30", "indicator--ee11a006-60cb-4c20-b2db-27b8408162d1", "x-misp-object--61bc1c8c-cd0e-4f35-87ef-c686650b7622", "indicator--44b91ea0-d5c5-45b2-b85a-cf3d37d53086", "x-misp-object--483cd876-ce01-40a6-a4d2-0f11987cd0da", "indicator--6b50419e-57d0-43b7-bc75-8c92995bea47", "x-misp-object--8a1d430b-966e-4e9e-86f5-fcf619c3dc87", "indicator--78c3f029-acfc-4d24-94f2-18058e811bd6", "x-misp-object--73af1f83-a272-4099-b219-b05e77c7d7e1", "indicator--e2f6f53c-1b21-4f9b-ba9c-da35fc181c97", "x-misp-object--e19b532c-dd5a-4278-ae1c-372d66b8b146", "indicator--7737ccff-f82f-494b-90cc-1b22e2c2b6b5", "x-misp-object--0d6879bc-8075-4bf5-9a98-f06c6991f1ac", "indicator--08609b6c-4c68-4ab4-8a22-8ce67ae5dd55", "x-misp-object--1f4d6780-90cb-4281-95a5-6524ce6145d8", "indicator--2b485a76-ed4a-4832-8601-93576827def2", "x-misp-object--bfe8c8f1-123f-4fbe-9a57-ca43bda77bbb", "indicator--ccb0100a-cc61-45c9-a42e-946b0b9a2bbe", "x-misp-object--3d1d4143-fd00-4946-b5c3-227bf730b271", "indicator--d28c925e-1dc6-4915-8cc1-31b30c1d3d77", "x-misp-object--7295e73f-9200-4da9-9cee-1235ab0ef8c0", "indicator--031272c7-aeea-4886-bc0e-c82c2399ced1", "x-misp-object--6279338c-1317-49e5-9fa3-61d39d1fd85e", "indicator--dd1b94ca-12df-4746-81b9-0f2762545592", "x-misp-object--345cb4a5-817c-402e-8306-11ac04b71d83", "indicator--2ac12e74-5306-4785-82c0-7ba96983994a", "x-misp-object--b55def3e-7c02-45e4-8e38-55ae68cfc362", "indicator--b5b1d0ad-ca31-4465-b922-bc5cdda1fe8e", "x-misp-object--bcd5c109-6f56-4f18-b58c-0866365f87b1", "indicator--3f19950c-9a19-4b31-8f00-1af92d3a1bc0", "x-misp-object--1d20673f-8d52-47c7-9740-2ba5d4dfcb48", "indicator--4998219b-3f2a-4415-9120-aec6680e1e44", "x-misp-object--80e03ba7-89f4-44f2-a0e4-6392a20743b2", "indicator--bfdac829-84e7-422b-98b4-6c2668aa0587", "x-misp-object--af568763-fed7-4558-9441-26b2cc6362b9", "indicator--86bad043-2708-431a-ba23-f83d6450e4ab", "x-misp-object--35347bf8-788b-482c-b431-3b6258b1e9b8", "indicator--8e08f62d-c431-4475-a0da-023c8f670606", "x-misp-object--a3062c18-d293-46c0-9175-e3c86691eea4", "indicator--cb23222d-61f4-420f-97e5-208d0df4d905", "x-misp-object--b3c43305-f706-4271-a3cc-9dd6a47f013e", "indicator--be84377d-270c-48ad-bd4e-797b86509254", "x-misp-object--54a18057-87d9-4091-a8f5-e919a6af8f8e", "indicator--b97217c8-a47e-418f-9dd7-089aaa3ad22c", "x-misp-object--738e4e9c-f2c7-4297-90b3-6f559923bbf3", "indicator--e06f91b8-355e-4ea7-9de1-3aa5a3b948bc", "x-misp-object--9f13752e-3013-45e2-90ec-6b5a99066505", "indicator--d294a9bb-d773-4cf2-8e2a-3fd99391206f", "x-misp-object--f61c6948-4f4b-4145-af51-b50999bace44", "indicator--82299055-ed80-4537-80f5-9436f519f766", "x-misp-object--2d2f3ea6-6d2a-46eb-8fa7-fe52ec43d7be", "indicator--d6278a28-8753-4bd3-b5dd-b615a535c947", "x-misp-object--e8b635f4-5d5b-4caf-9d35-c214b6dab867", "indicator--cb61ffc7-25b6-4635-af6f-bed3089af7e9", "x-misp-object--804d7a0d-4a71-44fc-a954-6dc9def20bbf", "indicator--cccbb05d-835e-45c2-8022-a743d3ad5851", "x-misp-object--8d5816f1-dcb6-4f83-8356-64b3ec5b3ba2", "indicator--d7d6852a-a95e-4d3a-84cb-06b3701e6a6a", "x-misp-object--c3a835d0-178c-475e-8d29-863ad198edde", "indicator--82a15bb8-9f6d-407e-b744-bb8b9fee2159", "x-misp-object--f2656df0-ab61-4366-972e-eb7ccf26e9f3", "indicator--69820f4d-ae64-4f60-b206-e7f473a8bb57", "x-misp-object--1712c055-825b-4483-a0d3-dfaa467814df", "indicator--1244ab55-e050-4f27-8815-9829d0d09a58", "x-misp-object--51b0df0d-f04c-4a11-8e09-bb63da256b07", "indicator--3308282a-8f19-47ed-81c4-f5f8cd8d007a", "x-misp-object--cf6405fd-7401-4d60-a130-a6224cc18428", "indicator--b7aed3f9-8bbc-49b9-96ef-1185d97372fd", "x-misp-object--3e466307-8e1a-4b17-b923-67ccffe9fb67", "indicator--21b42c11-3463-4f2e-9cf5-dc2f947712eb", "x-misp-object--5f436b33-8051-4e11-85ac-d19712b3b5f0", "indicator--83a08501-1293-44f5-972c-a638468112d9", "x-misp-object--4578fb47-f580-41dd-a90f-baa104b9d39b", "indicator--dfdd74ed-2446-41e7-bf1d-e876e277a29d", "x-misp-object--57ebad98-e219-4c11-8ba9-e89e7c956763", "indicator--9bc65993-ca59-4309-83d8-0444b2fb8c06", "x-misp-object--af6df848-4958-4d51-b02b-f26f53e48132", "indicator--978c6c81-588f-493c-b3db-a6d8a2a47990", "x-misp-object--aea5d4a9-d27a-4a59-b732-317d060c8df3", "indicator--b4ac89c0-7022-47ba-b5b6-b7d6f505aebd", "x-misp-object--cea5961c-f56f-47ed-805c-8ead55535284", "indicator--5c173e41-3f6a-45b7-8dc3-9fd00209ec77", "x-misp-object--e8449b46-a354-467e-9e49-68031b6e1752", "indicator--620fa80a-ff56-4958-893f-c9178f12924a", "x-misp-object--f6d1820f-b409-4ae6-8576-398772a06e02", "indicator--2b5a4323-cc12-4e0f-b80f-932c607e3061", "x-misp-object--914a9489-58b9-4d1c-9bfd-c89783e85427", "indicator--5fa6a990-0c0c-45a2-b44f-8f6b2fb92d30", "x-misp-object--29ed7fda-0038-4836-890f-220300a61011", "indicator--b8edda24-98d3-4d12-b8f1-0b075e5127e1", "x-misp-object--f17b3e60-ddc8-4acf-9c1a-23484fb6bdb4", "indicator--856f07d3-d2ca-4f97-bcc9-9c42047e154b", "x-misp-object--e81ed941-5baf-4a9f-9478-1a82e2806177", "indicator--67d15086-8265-4536-835f-eacf118dbdcf", "x-misp-object--4934a6eb-4335-4e88-ac95-11ec7ce3d651", "indicator--914b8dcb-39b8-41e6-9314-701cb1685d55", "x-misp-object--c3b196f2-3089-4461-9f1e-e2ded8cc54fb", "indicator--d2a0d57f-8bd4-4f7a-bd2f-558d1ccc9e42", "x-misp-object--994a0748-7980-4a57-a95b-2ea57fd7169c", "indicator--08a40cfc-aaa0-4762-9aec-343975e97a59", "x-misp-object--7c08f3f9-329e-409a-b4e2-ee8071725fdd", "indicator--d9defefd-c657-4cd9-b750-a295b80285fa", "x-misp-object--70c8bcb8-ca3d-4852-b4aa-8638899816c6", "indicator--c227e4dc-e420-45cb-9f53-1126208d93ed", "x-misp-object--cbca6d38-3a3d-4c08-bec0-22e39f71f2eb", "indicator--ddc8833c-f045-429a-9866-12bc325e4a8d", "x-misp-object--8f991164-986e-4588-84a1-017fc4940631", "indicator--413a18c9-945a-4bd1-b541-691bc530c2fa", "x-misp-object--7e632066-66c8-4b57-844b-3e57c53c0644", "indicator--5cf33f8d-dd97-4611-8b61-97b2763a0bd8", "x-misp-object--b267d777-f810-4701-b57b-47643fe6e370", "indicator--8a341ca2-f68a-45ed-9c09-cacdac4e43ba", "x-misp-object--949361d6-c71c-4ab9-b3b2-5fdef6a8549a", "indicator--05e14172-6a5f-4438-9cf9-18601485fee8", "x-misp-object--718abdcd-3f1f-4652-9751-33a11b262a4b", "indicator--ac9429a8-1a38-443b-ac79-947e77c20362", "x-misp-object--64350fec-6cfd-440f-82ca-f42b591d4a6e", "indicator--22d8e158-223c-4edb-b351-461809ff16af", "x-misp-object--d8c73c7c-20f0-4816-8447-5bfa171455f8", "indicator--bc5863ac-57aa-4555-91f3-f8cddfd3a380", "x-misp-object--fd565702-5854-489b-9168-aa56033b44b8", "indicator--37650bda-445d-45fc-89bf-25645506db23", "x-misp-object--adf2edf5-1bf0-43ce-bb48-03b0d632410f", "indicator--12a9552f-dcfa-4b1b-b9a0-8577c5f592d5", "x-misp-object--996697de-50d0-4c27-ae0b-f7cf1d789da0", "indicator--dc1da79a-987b-4226-998b-f6befaa03fb8", "x-misp-object--1456abf1-55d0-43f6-9a4f-e91acc35882e", "indicator--4775ae1d-ebf4-42ae-88cb-2d9e7b7e3485", "x-misp-object--81d57356-7bd7-44dd-99fe-a227e1ac00ab", "indicator--8d8f022d-7e99-4d4b-9999-3c7bb3331ded", "x-misp-object--720e4a35-25aa-4682-91b8-74d26d2c83ae", "indicator--c0993f0e-c4c9-4607-8438-5f67688c20d6", "x-misp-object--3ce18542-570a-4988-b75b-702cfa1a3c1a", "indicator--97971b0a-3559-409a-94ce-36fb05fbf4e6", "x-misp-object--1627866d-dabf-4069-bbe2-355f3f0a9647", "indicator--0fa0b818-b2b2-482a-8567-cc8996d54f49", "x-misp-object--816947c3-4298-4ae3-bb19-8e2b8986ad81", "indicator--66f170fb-5db2-4ede-ad9b-121ba032c974", "x-misp-object--6af3ebc6-434f-441d-ae40-b876937c8612", "indicator--21046835-1b5f-454d-8fa7-a0d11e43314a", "x-misp-object--5ffcf6a5-9852-4f0e-a619-c557f9bafee2", "indicator--bc18d46f-3297-462b-bcd7-6db52efaf56b", "x-misp-object--fe44dcc1-5471-4572-aebc-7fc43c58831b", "indicator--9bff3672-c80a-4c16-b2cf-35a63fe86433", "x-misp-object--8670cf25-98a7-42aa-9cc2-e2e9d90a037a", "indicator--4225cb42-201f-47ed-ad03-c0f4543cb253", "x-misp-object--26451a75-cc08-4fbc-87da-436e2cde572f", "indicator--e43eb2dd-268c-4940-a19c-8c059cee8e40", "x-misp-object--c336794f-46a9-4009-b240-e5cad850bb96", "indicator--da460413-76f6-41a0-a2b8-1542e365d0fb", "x-misp-object--0677e0d0-8a8b-4754-bb9e-68525e65a9d5", "indicator--0b4ad0cd-6a11-4eb2-a62e-85f88be78b2a", "x-misp-object--49f5f1f3-16d8-4061-b055-0b6335db369b", "indicator--40314b91-c2b2-4eee-9c6b-2fe46238896e", "x-misp-object--6e14b2cc-41af-4ef4-8810-6dcf339bcfcf", "indicator--8823252f-4421-4a25-b020-6c4d71b72f3c", "x-misp-object--70eb97ff-b5cf-4a33-9c55-b66c838dc136", "indicator--4c585e51-1879-481c-a50b-8ecef2fbfee3", "x-misp-object--13068af6-8ddc-4e99-a409-deda2159b103", "indicator--37a19c4b-d0e7-42c7-9611-445522921890", "x-misp-object--edcfd0af-4e00-4bf3-bfb2-f5e14e215c96", "indicator--1145dde9-b4a2-472a-9d5c-b9b6d48ed3a1", "x-misp-object--06473880-41e8-46f2-b9c2-4cee0e116855", "indicator--b3edef8c-598d-40e5-bb2d-18647024b51b", "x-misp-object--fbbb0d5e-64de-4be0-90d7-a093afb63f88", "indicator--9acd5c23-ef98-40a7-bfc9-caf28c3f23eb", "x-misp-object--aed42feb-e540-4b67-961c-f67718df57a6", "indicator--ab226ccc-8a64-436f-ad9a-9be4b5777b0f", "x-misp-object--44bf11f9-5d56-4ca4-882b-6702bcf34a30", "indicator--927f792b-19a9-4c29-82a9-b32675909be3", "x-misp-object--0d77908a-f0f7-4781-97d2-246bdbee37ec", "indicator--7a0a06e2-e651-4fd1-a48b-4b88352b1c4f", "x-misp-object--1ecae68a-3fa0-46b5-9a9c-4ef390e211bd", "indicator--1c2f9b9e-1a6f-42bd-93ea-8b0df438103a", "x-misp-object--ffb0fd88-2cc2-46da-869b-788448ed5ca4", "indicator--80c4fd2c-a08f-4ba7-bc29-6e29ea981bd0", "x-misp-object--42229f3c-506e-45d1-88d3-4e2c9f27ccad", "indicator--8d8aeabc-15b4-40f9-9bc1-7b07df4455b7", "x-misp-object--c7f784cb-512a-4528-b270-ea27855f4166", "indicator--509e750c-3a95-40fa-ad9b-76f22cdc492b", "x-misp-object--030a8ee8-106b-4afd-9a08-f135111ee17f", "indicator--8aea02c3-b7ab-4049-a7d0-574248ffc5ce", "x-misp-object--9fe05add-499d-4dd5-a632-7f6283f12006", "indicator--9f4251f1-9409-47b5-a6ab-bb1b0eb81236", "x-misp-object--a6c66b4a-943b-4095-89fe-af13049c2857", "indicator--627d360a-1b2e-450b-8fba-76deceb75528", "x-misp-object--04de7a55-7030-479a-9a54-1b3b5857a7cf", "indicator--d34ba1e1-ea64-48da-8df2-4ac0c83d2174", "x-misp-object--64bec757-4f02-4661-be85-d133f1f916f4", "indicator--95d5d4b0-6b7d-4606-aad5-deffead81484", "x-misp-object--8c3771ce-366b-4cfb-be18-490fef4a77e3", "indicator--7e2b3829-7e79-4457-8c46-52cc0a4c135b", "x-misp-object--7cfdff1a-969b-4132-81e2-91db2d53b935", "indicator--6b7e96a4-c224-4cd4-9463-0a4abfe1310c", "x-misp-object--6d78971f-8ac5-459a-8e28-61152f4387f6", "indicator--6d443c89-c0fb-498b-b29c-f70a8e9b7441", "x-misp-object--f7e1ca9a-c724-4270-b711-d7311d1bf670", "indicator--8bed1326-1a1d-4928-8b15-a0b7ca1ee902", "x-misp-object--49292793-cd90-46f5-826e-83edb402829d", "indicator--d1bc2cce-a622-49f4-aeb8-5b953ef057bd", "x-misp-object--320498fb-361d-4be2-bf24-c44442ba1d43", "indicator--139c2340-d819-4e2a-b7ef-5db4b5456996", "x-misp-object--11fc4165-9256-452c-bd57-91eea67d52f7", "indicator--9a4100e0-80fa-4c58-8ea4-c72ae84eabea", "x-misp-object--529f731b-28af-4b92-a2e5-02df29872815", "indicator--136020bc-9d22-4ff9-8ecc-0593daa5cdc9", "x-misp-object--a0368a1c-1331-48d8-be77-72246033e74d", "indicator--df75d959-0373-4dcb-9d03-661b2e89367d", "x-misp-object--dd4de532-cdff-43db-9b08-383978d10ecf", "indicator--7cf04113-a5ef-4039-a3e1-ffe4ec7290a3", "x-misp-object--b9d2a895-a418-495d-a507-6ed53e60da61", "indicator--2921db48-769c-4001-86d0-7f439fd5895a", "x-misp-object--744bd821-f292-4972-a1c0-9ef1cb1501d8", "indicator--3b4dddf3-912b-4a36-a71e-036980f6e913", "x-misp-object--7f3cc856-802d-426c-8c22-246dc019e2cb", "indicator--e12bb0ee-a69a-4146-b055-56ca6d2cc0fc", "x-misp-object--9489f5d2-ff71-4fd0-815d-78330163a252", "indicator--2176c24c-867e-4722-a4f3-93baf925f23b", "x-misp-object--01a3a067-3cd9-4ad4-9d0d-edcfaeff95e9", "indicator--d99541c3-21f9-4e43-a072-f9f348acc61a", "x-misp-object--004be45d-0741-4968-86ee-422470e10454", "indicator--d3259046-b495-487a-ba1b-213849af711b", "x-misp-object--84bf6f44-a6f7-4787-b77a-8aa652de24d1", "indicator--4b42b7ba-a997-4165-ba35-d68532e67774", "x-misp-object--17a3fa4e-9caa-4187-a01f-829a2a81b273", "indicator--af041428-4279-46bf-93f7-95a9ae7e9ac0", "x-misp-object--a4eaa802-abe1-41ad-8dd3-d0ce3294cb7d", "indicator--908010cd-28a0-4f08-a7a5-69281f864864", "x-misp-object--d989e4a7-23b0-46e7-813f-00cdf793e023", "indicator--2df4ad14-cdee-402f-9b29-66314a34cfca", "x-misp-object--ae6eff32-1af2-4531-9939-8eefe6ee25dd", "indicator--4ebe1cd8-46c9-4f31-a5df-525f4d91d446", "x-misp-object--1c2bcd49-2485-4949-a704-8b12e30d65e3", "indicator--b0da95dc-a85b-498e-a0f0-679b8220ab3e", "x-misp-object--11c2e221-8fef-48d6-a2d4-9699d52ca330", "indicator--fac77102-1466-4b49-af45-0081aa168519", "x-misp-object--b430aab1-6ef2-4ec5-9720-0805c1640c39", "indicator--45b7e720-e0f0-4621-89a8-be81720d360f", "x-misp-object--2e00b881-7805-493f-9af6-3dd03df10987", "indicator--3f8e9ff9-7ad7-4167-acc0-a2ceffd681c1", "x-misp-object--b44e8fc7-c3df-4948-8559-55c3cfa79ffd", "indicator--d2507aa9-43ee-4889-aef0-76757a8cbd64", "x-misp-object--dec03b16-27e2-4093-ab38-a00a27bc5a16", "indicator--0de0053d-c9e3-4ca6-90ef-f56a945de1d7", "x-misp-object--49283bd7-ffd4-4c00-acad-f7b0e61e4a15", "indicator--f188e92b-8a5f-4399-b9c9-e745b9398888", "x-misp-object--f3765bba-c4df-4ada-9640-73b6b56bdcd0", "indicator--ee9122b3-2621-4f5d-8f22-6936733b76a2", "x-misp-object--66faec5c-f35f-4310-ae76-b5d133c3d514", "indicator--5d5cff29-0013-4f58-a217-5ffc70a9b467", "x-misp-object--8ba5aae0-fca0-4615-a91c-db32cf0e838c", "indicator--d5de0f3b-09de-463d-85b3-3348fc8a6331", "x-misp-object--2c00b6d5-4b71-4749-8627-c2f99359e324", "indicator--9e409b3a-5452-4c05-bdb6-83a7b07e379e", "x-misp-object--ceebf3aa-a6a1-42f9-b4d7-bc07e1c353fe", "indicator--a0a7273f-3c33-4691-8ebe-3ce2b0d33c72", "x-misp-object--b8e6eadf-5c37-4201-9195-f248b9a9ea9c", "indicator--43c21a39-d823-44b8-831b-c36317700f44", "x-misp-object--6186ed82-e296-4016-b6ca-b6fefd19587e", "indicator--b1fe42d9-2519-44d7-b1a6-87056aa9ec7e", "x-misp-object--f994c47c-ea40-412b-8854-d748ec104625", "indicator--399781fe-7ce3-48d4-836f-35080235fe53", "x-misp-object--f08dfd7d-fe11-49fb-b4aa-29990ca09262", "indicator--a8903b85-2d3f-4c0a-a072-de47670e4c51", "x-misp-object--6336762e-38ab-431d-892c-11eb2ca40cae", "indicator--ca64f9b1-2a0a-4762-8f9e-65670a29d957", "x-misp-object--c15a3bf5-7ff8-4325-af1b-f8cfc5ba01d2", "indicator--10f161a8-d5a3-4e19-8ba6-31e105782123", "x-misp-object--671f2cb9-b54e-4da9-bcb3-960d30dedcb1", "indicator--07bf697d-c098-4b87-acb7-f4634bc6638c", "x-misp-object--4df2a5d7-3d89-4706-8ffc-c322b2069332", "indicator--4f394327-9de3-4f16-bd7e-67ae011e2253", "x-misp-object--c4e37357-07eb-44fe-a2a0-dcb9ebfef7e6", "indicator--3905e8e1-d889-4208-8cc5-e6f3b7f9056e", "x-misp-object--41093629-a5d7-493d-8c2b-f479a8fa8529", "indicator--80aa0c4d-56c4-4304-86c2-8a23da2f8ce9", "x-misp-object--8bcd1506-8712-4d28-9a58-ca9647175c66", "indicator--b5f6d323-9417-45f7-a465-2f585eda42b8", "x-misp-object--45739206-d155-4d6b-af93-2f86cb8ac7dd", "indicator--9d007af0-b71c-4b34-92e6-57a09987bbe2", "x-misp-object--8da16671-3dec-4c2a-931d-e88fa1bdd9ee", "indicator--49b74b3b-9e5a-41c0-9cc6-1ceeaf82fe66", "x-misp-object--3301e1c0-2d4e-4f28-944a-6c156a8eb79c", "indicator--895f0bf6-c013-48e3-8d00-7055d79eec53", "x-misp-object--6d232c0f-d48a-4b00-8bcc-5d72e80bcacd", "indicator--1a3ff89e-aa94-4403-9b1f-c8b939f194f1", "x-misp-object--22395f70-e94a-43fe-a45a-d4e21ebc289f", "indicator--8d76e8fb-32e8-4b38-a540-8ab6539c1a13", "x-misp-object--d6a57e30-b781-4431-96c7-a3922f77c64f", "indicator--8ddfa5e0-c492-4661-92cd-e927230d5b3d", "x-misp-object--ea151dbd-2122-4785-9e0b-4adee906b295", "indicator--848a653a-0ff6-4b48-aa3f-ed315f673c79", "x-misp-object--44e7f385-7e2c-419d-a1cc-9a62e0cb1be0", "indicator--79a94358-05a4-4a42-80fa-7449e6261551", "x-misp-object--692fc00c-4eb6-45d1-9772-d705f620d05f", "indicator--de1f9e1e-cc20-4d3d-ba3d-ff289e81ea2e", "x-misp-object--bd207aa7-e09f-470d-81da-8745020f58d5", "indicator--dafda082-ec7e-46ff-a7c8-41af48f58dbd", "x-misp-object--79f3e338-4702-4264-aa1c-c03b057e5207", "indicator--89038c85-d67e-4771-afe8-5a91d9d6edd4", "x-misp-object--36eac465-9951-41e9-ada5-3b203a4ad794", "indicator--dcca29bf-3545-4c53-8410-5f92da6d4820", "x-misp-object--8a9d68e7-d771-4af0-a4a6-4fb30dbfea47", "indicator--acb977e6-4468-4ac7-b23f-21c5f5636112", "x-misp-object--4fe83c08-1055-407a-b799-ded69ab4fccb", "indicator--bd503999-5a9e-43ea-bb23-776ad89490bf", "x-misp-object--a47bd8da-bdbd-4aed-9eef-a11e36096b26", "indicator--00af6957-6e5d-4518-a3ab-78db7b785812", "x-misp-object--e9de06fa-e36b-43b5-b5da-9da311f24fe0", "indicator--5250e462-e606-43b3-af21-b25d353ca77a", "x-misp-object--6ae57d88-3897-4d06-aea0-539f68acd4f0", "indicator--4fa3da7c-2e32-4789-aeab-967e4c7043f2", "x-misp-object--75254811-0801-4316-b27b-df50b7439502", "indicator--b10a1850-a549-42eb-a281-15589b9804b9", "x-misp-object--e131e510-e043-4d38-a582-391c654a491e", "indicator--f6a62907-ffae-4a96-b58e-a54dc45bdd71", "x-misp-object--73293f69-441f-4861-8668-9babeecc2ab7", "indicator--da8a4dce-3681-4781-9bcf-b6cece8ddcee", "x-misp-object--f0b4badf-9446-4115-bd57-b2a66f55f470", "indicator--dc5355e8-5eab-4718-9235-f1b551b863a2", "x-misp-object--2d79df26-7862-4e28-acf6-b6b1a331755e", "indicator--d5911876-ca1d-4b22-8c38-7119fca9fa0e", "x-misp-object--487e2e6b-c536-4df1-accb-a29b42e96b2c", "indicator--0e4cac6a-d9b5-4118-bde4-60ad3a609a8f", "x-misp-object--146e4c31-21b3-46fe-b8de-7f769392972f", "indicator--f0b0d5df-1bae-410a-9926-6a0e64f64ff6", "x-misp-object--69b924fb-8254-413e-9800-544b82939ba8", "indicator--26df4a37-ab0a-4532-96d1-f2e7c0109bd1", "x-misp-object--5e7ba62c-dec2-4434-9031-ecbe140bfe09", "indicator--077ac4ee-08ca-446e-88e3-c860f15d6e42", "x-misp-object--19dbb91d-5dc1-4a68-beb7-2855a8b55944", "indicator--16be79c8-3fcf-49ad-9a56-0c21f71a340a", "x-misp-object--89a77099-d59d-44d4-8a59-0738bb796d43", "indicator--9652d6e1-a194-4a6a-929c-e7e956850f89", "x-misp-object--52a4df42-1337-4088-bf56-b667387402a3", "indicator--d1d8a404-37d2-4f24-9178-8bc2dbe65ccf", "x-misp-object--97568f59-097d-4e72-b4dc-fd68c408c85a", "indicator--03e306e0-62ae-4534-912a-59d311bc5ccc", "x-misp-object--9b39352a-bfd8-4477-ac80-b9092c06bf88", "indicator--3d85b1c8-be3d-4656-918a-168f4f155069", "x-misp-object--1c6103ea-83ca-4a82-aeda-c4aa8f13e23c", "indicator--04b2a401-b201-464d-810b-88383d077361", "x-misp-object--aa6b3be5-ea62-429f-8e69-13ae6bed6d86", "indicator--882870ac-fcf6-4458-b142-3c80c26ccbe9", "x-misp-object--87ca3a43-63b2-4b36-bc14-b1d410544873", "indicator--d054c158-41ed-4da9-a47d-6a27d632286f", "x-misp-object--a3318579-3b87-4794-aa53-dceb5cb0f91d", "indicator--56f36f82-1ba1-4809-a5e7-90cd21f3aaa0", "x-misp-object--f5228bc9-0596-44c7-a7d1-fb756784412d", "indicator--b91e8990-cf2b-407a-8991-bbb3608c6b9e", "x-misp-object--f83f28b9-063a-446a-8f9c-38f9c269399b", "indicator--e4a9332e-e3d0-46c9-ba7d-ca1c7293848e", "x-misp-object--320ba851-d81c-484f-894a-701364ece4c0", "indicator--b3324698-2b4a-471c-b45b-e2f397b81af6", "x-misp-object--077cc537-080b-4c47-bf21-7df045b20744", "indicator--9fa8595c-97de-41fd-9276-d562acbefb96", "x-misp-object--dd2d5a11-f02f-400b-9d17-a9e9147288ee", "indicator--446c3020-b0e4-492c-bd12-7066f1104d9d", "x-misp-object--0888e8dc-2d19-41be-b507-e64d24336064", "indicator--ec43784b-9ba5-4e7f-8dfe-5a027d2a39c2", "x-misp-object--66b5dbaf-aead-471a-be05-03d7ceecff15", "indicator--2a2a5f55-bf30-419d-8aca-626ac8cff579", "x-misp-object--feeab5d5-1436-4855-9ba9-bfd9f5c956ec", "indicator--5db9b3d7-9465-4c17-96f8-f5ed425224aa", "x-misp-object--f9c1b826-7799-4c2c-a723-07377a3d1bfd", "indicator--3be79107-b34a-4c7f-ba2c-fef85b1cee8b", "x-misp-object--166bda7d-6c12-4ddc-a33f-2d4ef0d3ec3d", "indicator--6baeead3-c809-41df-b607-ca5848e68fb1", "x-misp-object--f491f23c-43cf-4453-87db-3607b86510a4", "indicator--ae8e3d01-4e47-42df-9607-9167544acc06", "x-misp-object--5062fa66-2e6c-4fe1-8aa7-43cf26de6aad", "indicator--7fb8d9ab-db52-4104-8f75-f38f288d8b1e", "x-misp-object--4ee3557a-7d82-4325-9be5-ce3d1ad60f98", "indicator--6f20eba9-8ddc-4fd2-8308-09ad81eab0c7", "x-misp-object--be45c6a2-715c-4c95-9375-97988cb782a5", "indicator--c8442b78-eb30-4e6b-82f8-c493beab29ad", "x-misp-object--b15ff2f5-a898-4dbf-92ef-2630c13bcb9f", "relationship--8cc2e843-ac80-4041-9115-e9e3769542ca", "relationship--02fc0f77-2511-4334-a3ff-5b7e523987c5", "relationship--09ad612f-4f5a-480b-beed-69509535f0ec", "relationship--bc27d892-462e-4631-9518-7c9ff46ef641", "relationship--6c0ad717-248d-4170-96b6-784a40721bb2", "relationship--3891a8cb-a476-46b1-9ad5-61c028ac0731", "relationship--39c7b9e6-2117-4908-b1f2-73aba03f1817", "relationship--ae4cd86b-f153-4097-b7c0-64bc993390f7", "relationship--53864d4b-fa85-4579-8e3a-d3c9af5f55ac", "relationship--739cac21-951d-4910-a142-41f77904b78c", "relationship--85c8ca4f-a260-4310-a5ad-5031a4c208a7", "relationship--b271f609-330b-4e1f-8faf-c7858d1179b6", "relationship--99e4bc1d-8512-439e-b3c2-a05e53ee0158", "relationship--53f2ec9e-dc10-49d1-b165-76bde89c6e0d", "relationship--cc207191-3c18-490a-b25d-f43bcc2d1451", "relationship--b5aba582-2b36-4cc4-b021-a0a7f04d987a", "relationship--f7701484-6a1e-404e-906d-53ca0bc4c232", "relationship--87c23067-1e48-4051-a303-27a5f788521c", "relationship--ec333403-57bf-40ba-b004-0b341b9ae9f9", "relationship--444d7642-e1b0-4270-95b2-020e14dd7670", "relationship--c3027171-65ac-4ac6-af0c-0c8535470ad5", "relationship--d5b91ceb-59f5-4342-ad32-ef98a4f749e2", "relationship--c3a03966-3809-42d1-bd6f-efeefc77beca", "relationship--1af6ba63-f61f-45f2-89c1-fc41ee9fa1a0", "relationship--d2f0efd3-21ea-46f2-82eb-d300cb6e705e", "relationship--9e4994bf-a8d7-4f16-96d1-5ac8bfdc855c", "relationship--7c78c848-64ed-4b99-9981-51ca547b8c7d", "relationship--1a3c3cc8-fc38-42e3-9f73-253bb6d0355f", "relationship--e9fc5c71-cb86-4183-ba4d-1767eead01bf", "relationship--ad486d24-4124-4816-a0c7-2a322a871f68", "relationship--37594a47-7da8-4b89-a23f-89ebf22fd5e5", "relationship--0da6fdfb-fd70-41fa-b6d2-9b3d33c2a0e2", "relationship--fb02d7e7-2497-48c9-9b0c-1504e0daf5ec", "relationship--102c405f-a598-4e8b-99be-93cf928925a1", "relationship--9bc6df54-59d5-4178-a93e-6466d6f66d76", "relationship--1de0fe3e-37bb-4401-8d49-382451218816", "relationship--17bc97c2-a714-4e0a-8269-78fd58200512", "relationship--902f39ed-c549-4150-974d-281027f6e832", "relationship--c04d29cb-0a1d-403f-a50a-2a8126894062", "relationship--3802507f-0936-4c0f-be42-885abee548a6", "relationship--82943dae-aa12-46ab-8939-df08b124f5ca", "relationship--ee9ee2af-4ee8-4c67-a908-4ff9d600ae27", "relationship--da9676d7-c950-4755-bdff-b17b48f98aff", "relationship--2379a796-62d5-4886-a005-393e569fe5a8", "relationship--310d89e5-392a-4692-b40f-8928dd16a0f0", "relationship--1afd2c7e-906d-4d0f-8922-cd987ae62099", "relationship--29576157-7e1d-493e-9eb2-b1297fc7ca83", "relationship--52cbd4da-7d9e-4fd0-9f98-cb64adeccfb3", "relationship--28b053a8-2fa8-4cbd-bf9e-8de3c8815d0b", "relationship--f0f4eaf6-9f4d-47ad-8cbc-0ca26ef253bf", "relationship--fd10ffda-7ee9-489c-862e-afcd9bbe1f65", "relationship--b24d0aaa-53a6-408c-a76c-4be8dad1189f", "relationship--1d04cfa5-7eb7-4246-9ed6-93a980f822ba", "relationship--c4d13c29-a1aa-44d5-9114-2639897b750c", "relationship--b9441082-d7e8-44f9-b3f6-b7a397d8e6de", "relationship--76a2492b-f9dc-4058-8e36-99965845d0d6", "relationship--b6ecfe4a-7173-4546-8bb1-657634c9a96d", "relationship--b06c90a7-fa1d-4f7a-aca2-77ef1b4f7263", "relationship--b9e1b6f4-d16e-46f7-9ee3-14250e6ff6c3", "relationship--e12736a0-f1a3-4b61-baf7-4586edad4c7d", "relationship--6a240ab3-2be5-4307-a365-36ce9d546092", "relationship--9c7be638-8e16-4435-b4df-add21e3c103b", "relationship--12a604fb-7e1d-4e06-b0d7-dd378163c9c2", "relationship--20138853-5d1e-4370-bea1-4769d43931d5", "relationship--e71e8c17-3022-43fa-86b7-1ac744cd7215", "relationship--0baaa1fb-3370-4e48-ae8c-52ce601c0604", "relationship--77aae7d8-8290-424f-9b18-96829830981d", "relationship--564ffd7d-ab00-446a-ae92-2df62c9b67b8", "relationship--251538a5-a7a4-43d0-b9b4-b334c3ac73b1", "relationship--d3931fd9-4a76-4adc-9cd7-0077505341dd", "relationship--0cab40ac-48a2-4f86-b3a4-517141c07439", "relationship--11d7f080-ae64-453f-9e65-877920c57d47", "relationship--e773c0c8-0917-490c-9584-8bef593418d9", "relationship--ef1e6edc-09d8-41b5-aec0-37aef42f1633", "relationship--810ae5b4-b4f0-4cd2-8fca-11b2472f73e9", "relationship--25c6a6e1-95b2-4ca2-917f-29fa63e458af", "relationship--f63540f6-c3b9-4ac3-9fca-41f21059e4f0", "relationship--3b5331ae-d7cd-4cfa-b77c-dcbd646abf3a", "relationship--5232bd7d-4001-4689-a684-f5265aa0ca5d", "relationship--0874c7f6-f084-41d8-bca3-66fe7270de74", "relationship--2dab95c8-72ed-418d-9f80-6c0eaf4ef06f", "relationship--aebe7b40-7fb6-472e-9aaf-37636e51f15d", "relationship--3c3fbaf8-9a1e-4ce3-ada5-4c33f1dafc99", "relationship--621594f9-76eb-4ded-937e-294a6f902029", "relationship--1e2f3006-dc94-4904-842a-e99e4302b43d", "relationship--68307315-d9eb-4cf7-ab53-09cb6460cfd4", "relationship--731f1f72-b8b0-4cec-be68-8b12d429ef0a", "relationship--76e8374d-cce8-4dd5-ac12-b91d5c66d800", "relationship--59e0f33c-cede-4ba8-b959-770ae1f13e71", "relationship--7cfc3129-0289-4360-bec6-e1061204a236", "relationship--8b3453f2-0c8b-485c-9695-4cf1ef174f71", "relationship--c1f94184-8cce-4752-ab3d-3058c7da8f31", "relationship--bbdb3534-30df-4453-bc8f-ee86c53d3c06", "relationship--149efe0c-8a9c-4254-9e3a-6e49adbf5f95", "relationship--f6075e82-a5a0-4d8c-925b-500cd92dc2cd", "relationship--2186acc5-9422-4da4-a30f-57fa73a80272", "relationship--2833c2bc-b90a-4320-9867-dbd2b9d09478", "relationship--1d0527e6-4d98-400a-bd29-7c884dca5156", "relationship--72cd7467-999a-407a-928c-c65bd4e1656d", "relationship--69858a14-684c-473f-97f9-960bfd7bf76c", "relationship--73e4957c-70a8-4272-9fb6-d25a270b3e16", "relationship--7c92d8fc-492b-40aa-9f71-916dc1a2c309", "relationship--652da695-06d7-400b-a5b8-14179e1e8a69", "relationship--bee8df9b-2a7d-48ae-ae7c-2bcf0fcd20b2", "relationship--246decb4-ed4c-4347-a945-fa541843e0da", "relationship--0b5ca8c7-f5ad-420e-84ae-ed78508c2220", "relationship--87723027-ddce-4fa0-b260-083e0b1a2bcc", "relationship--291d68ec-4910-4811-9aa0-fa2ca4742960", "relationship--708345b6-3138-4d2f-ace2-51023e97ad7b", "relationship--24abfa04-0575-4907-a4bf-930d26036fb2", "relationship--9c0d9903-1174-4e1e-9355-ec1309e0d437", "relationship--fb5cd5cc-87d1-4aeb-acd1-33e2949a1080", "relationship--96ddd943-8870-434b-a13a-9d1b317059d1", "relationship--aa987ba4-a6a8-47b3-b97f-3eb7c1248c7e", "relationship--150026c6-1644-4d23-8ce6-d6d14b257079", "relationship--7d5a9949-9d23-4784-ad91-72331467fdd6", "relationship--dfdd8e2a-1018-4c8e-aef0-93367d65033c", "relationship--6d965980-dcb0-41d9-82ec-b3bccf55f3be", "relationship--2f838041-d644-40b9-84ec-6c17bea8a4e9", "relationship--09286856-5c2a-46e8-9a5f-64aa40869f2f", "relationship--8208566d-3b8b-4a0f-90c2-98bda15c6ac9", "relationship--5d735471-e678-49c5-aea8-fb02d8d9ca62", "relationship--a5aec87e-9553-4be4-be5c-adf8135f9d35", "relationship--8512941e-c05b-4f29-8c38-2e6bb8cd4a50", "relationship--3aa0d7fa-a4e2-47fb-bee0-f3eab269d863", "relationship--36228c94-1de7-4eb1-82eb-23343fd34861", "relationship--67416310-df01-4fef-aa96-8ab7af93fe8a", "relationship--2acbdb3a-ec13-4e0f-80a4-d75621b7330c", "relationship--9f20571d-0bc3-4f4b-90ae-45e1a0d94543", "relationship--28b454eb-e4e8-4a37-87f1-31a92cba486f", "relationship--7791a1a6-4112-4ceb-ac7c-de1adc97a966", "relationship--3649f154-9775-43b5-9b7e-db98ba1caa66", "relationship--7ad78b36-d89c-45fd-8c97-e8da1e65175b", "relationship--05523e45-2f51-4880-8fff-12f28c98ab21", "relationship--243ed071-b0ba-48ef-a03e-be4494801ec0", "relationship--fd0337dd-8e74-4092-a4ee-35ff5f667816", "relationship--385c0e15-c116-4359-ad6f-37c08521a25a", "relationship--3c23bc48-f3db-49ee-bff9-6315bcd01786", "relationship--3a40d2ca-43f6-4132-a8db-141fe009273d", "relationship--5c10a998-bbbf-43e5-9689-6a05d629eee4", "relationship--7284d20e-e9fb-49c5-b85d-14453664ff8a", "relationship--bab00b15-3daa-4dfb-999e-406c32016d3f", "relationship--3b316dc8-2fb6-43e5-94a1-5340ff1f4f1e", "relationship--4a56d6aa-b1e9-4b02-bdb8-b6da6a979f3b", "relationship--eba20770-c48d-499b-99c8-b1be06ec7eb5", "relationship--12a46e3e-b70f-4dc6-9cdc-7bf3a0902d35", "relationship--1a7ca46b-2ec5-469e-9921-7c2e780cedeb", "relationship--079edeae-5b53-47a8-94b1-f7723afb9d98", "relationship--77e48b74-8849-4a67-9e87-6666d6daab0e", "relationship--215bb729-17f1-4a94-92d6-ebf0f3d49849", "relationship--89e5e7bf-f836-4d5e-ab38-c6c353d59e2c", "relationship--73650400-4943-4c13-b767-98aeaf8098d2", "relationship--5c131989-5528-45d3-be76-6f868917f9a3", "relationship--da450201-5e92-4ace-a4df-a4e3a8cee101", "relationship--1907aa7e-7553-4992-87f5-fdb6718e2ba3", "relationship--d46ba3c0-f60e-4eea-ba07-54c55679b968", "relationship--0ba006f7-a968-4ea6-b6a8-91e38c12270f", "relationship--ec86da64-d07c-428d-b95e-761ff0a7a042", "relationship--e5b02dd1-35a9-408b-ae54-68c1e3adb54d", "relationship--318ecf16-3602-49e1-82e7-2dc107c4c137", "relationship--eaff9f57-f3fe-43b1-95f2-d76f20cd185a", "relationship--973b1dc6-555b-4b59-8f9b-36a96dce97e6", "relationship--da500e9f-a4f1-4d47-9a26-70060cbe0fe0", "relationship--2ff6878a-60cd-4bb9-b8ca-7b2af0cbadb4", "relationship--9a009583-1931-4e41-ac12-d7c1d32f7f85", "relationship--6dc8ca8f-2877-49c9-8fe8-cfbba8a66978", "relationship--a37e3f5b-6b5c-432b-add1-096115902394", "relationship--eea784f6-6460-4a02-91df-a82bfadef313", "relationship--0a4726b0-70e6-4a33-b222-3b021b0427a5", "relationship--1fd3b7b8-5588-4045-9494-2e682ced28e3", "relationship--da8a8cb6-5cce-4f12-999a-decbc7a60221", "relationship--20d29a78-c0b7-4913-b104-62fa03151907", "relationship--b47a954d-2769-439b-b322-8422b6959fba", "relationship--e505219f-1409-411c-91b9-84c3eda1a965", "relationship--5c49b759-c0fd-4867-af0a-22e8b49434c7", "relationship--49eb22ff-3515-43e7-894e-dbefca8cc87c", "relationship--728e1822-7759-4d3d-97b7-1c25b4521298", "relationship--1d7f94c9-2a5b-49bd-8a09-b74bdd5a3b92", "relationship--75ae48fc-9c96-4187-aee9-cfa89d7aed85", "relationship--f4ad3b3b-9bfb-418a-aeb2-992b2e413687", "relationship--a0117f7e-f538-4ddc-bedb-eb7a1fa1220a", "relationship--f74eabc6-2d6f-4833-8b55-8c472c5cfae0", "relationship--8bc4343f-b05d-4cda-a074-5fa3bcce4924", "relationship--53fd8aef-7083-49d1-a1a9-f7e184ef41a9", "relationship--19f41d5f-04b3-4ec0-9d72-57d9cdf56d3e", "relationship--11260109-8639-4cad-bb29-a5c964a6a276", "relationship--84e4384f-ada9-4f95-88a4-e50fa1f41f66", "relationship--47376437-fa68-4b11-ae0b-740d2c9af2df", "relationship--2518bcbb-21f5-4c4f-95e3-d44ddce7376e", "relationship--28981d55-682e-42d5-b70f-f84d64f8d30f", "relationship--0ad94902-ec64-4b8b-8495-62604456f903", "relationship--8bc7c74e-e2a7-415a-ad53-de5fe93c24a8", "relationship--b4bd2e30-66d8-4252-9a14-9ec626542a49", "relationship--fcde48b3-9b16-4488-a261-bf046b9f8690", "relationship--c4c9987c-91ae-4930-9d8e-8f80ce2566b9", "relationship--f7abbad3-471a-4eb9-982a-56096e2aacd2", "relationship--b4ae79db-22b5-4f49-91cf-14db2f0a9873", "relationship--9d9752ac-827f-43cb-b890-1bdf319739c3", "relationship--12a7d87c-58a4-4803-9448-5a76adaad1a1", "relationship--3e237bbd-af5c-4bfd-acf2-7eb62b1f7cf1", "relationship--9f1c7ae0-e1fb-426c-8335-64ae738d55f8", "relationship--a1f83cf1-8a9d-4f9a-9ef3-9516e0319bef", "relationship--76b5c9d2-0021-4e38-98cb-385042ef805a", "relationship--51a86588-f1c2-406c-bbc9-b359b6be8670", "relationship--938ccb0a-aee4-4d9d-91d4-49bf79d36b38", "relationship--45166eeb-f031-4dee-b2ba-8de170b6d1fe", "relationship--da1d56af-1a8b-4673-91b1-c69c5d1035bf", "relationship--bec8afb8-8f36-42b7-823f-c4925969f578", "relationship--f3de4a37-879d-494c-bc73-d18602c08b06", "relationship--347a22eb-fb58-4cd2-b8be-6f1d3579ff32", "relationship--04cdf692-d2fc-42e0-a5ea-941dee105b5c", "relationship--938a7d2f-996e-4479-aa4e-35793a3bb18b", "relationship--d754e6c4-d6bd-418f-b957-da3a75f7eb80", "relationship--cb07dbf4-d451-471d-b597-a60beb3f8458", "relationship--c201739c-89d0-44d0-8ff1-defc3886a164", "relationship--0d96c8fc-802c-4ff4-b7c1-a77d127a6830", "relationship--afbf4356-496f-4802-a839-2acc6c11681e", "relationship--4d8c15ff-01a3-4ecc-8aa9-b8140b8a1b7f", "relationship--23b28810-162e-42eb-a577-3254624b30a0", "relationship--4b3949a4-8bb6-4c98-accd-68e87cfa0aa6", "relationship--4743cc7d-73ab-41d1-bf50-643d7f4479cd", "relationship--08703912-0743-4804-b82a-2a2ca59dc5d4", "relationship--d24ba6fd-1820-45f8-84c5-bb7170d15f90", "relationship--f12fd4ad-f347-43fc-80b3-16d0c6a2300d", "relationship--678bc4c8-edb8-441c-9937-a1d67b11be95", "relationship--67963398-dbb8-4004-b376-432fa5830320", "relationship--0905c0b3-7c2a-45ff-955c-bba30cbc53a4", "relationship--f3f0c8ba-30df-4dee-9fcd-f727d7b8cf01", "relationship--c5a4360e-d4b9-41e2-b47e-812da3d99807", "relationship--1797bf5c-7a48-47c1-bf4a-c697697a2aa6", "relationship--d46c056c-56bf-4855-92a6-64f89c79d92f", "relationship--ee42dfe9-c4f2-46ce-9a18-448a299cb894", "relationship--e2c6d763-773e-4d67-aaa5-8cfc7003cc8b", "relationship--bfd9b3c4-3d8a-475e-90bf-0d848053cfcf", "relationship--02e9ded5-869c-4635-b558-29801d94f4f3", "relationship--153d9c4b-83a4-4c78-8c49-ef2e9432f95b", "relationship--a07b3ca5-0382-4f64-aaf4-e80371b467a0", "relationship--fc4ae9e4-887f-43f2-b17d-8137aaec965b", "relationship--3bae3ac9-17c5-4476-ada5-1a49b00a1a2f", "relationship--20a1b7e1-29bd-4d82-9ae4-1bceb66641bb", "relationship--74b44eea-b0e2-47ac-b5a5-71cd523996ff", "relationship--a708b650-0bcf-4405-be59-89f49fc29ecf", "relationship--4d3c8344-3b14-4e6b-9b48-b4d0e0a12b47", "relationship--7b3be172-4da8-4ae6-9b5a-3b1cc90df8d4", "relationship--89601073-696e-4555-b57f-7f3ebbef81c5", "relationship--6edb979c-75d4-42d5-b20e-222ac381f73c", "relationship--9b5f1c9c-55de-4a0b-a8a7-b9684c0cc3d6", "relationship--37be9a58-d52c-4f77-855d-15ae1d1cef52", "relationship--abd62766-5be6-45d2-a50c-d976642197a4", "relationship--cc3baf71-0289-4145-9b33-cc171533d64a", "relationship--a4fd7649-1901-4ccd-8749-ffadd3c7366c", "relationship--a7ca3124-acd5-4461-bae3-125945764163", "relationship--5bfca9ec-00a3-4e8d-b54d-d60702bc8a1f", "relationship--610849b8-4a3b-40aa-b75b-b6e402ae79c8", "relationship--8f2e7362-ebce-4702-8fff-d45a95271d73", "relationship--f4595726-e0f6-4fb6-9749-b41d07c45162", "relationship--01cad9f8-fef3-435e-b0b7-9c667cad539c", "relationship--50600633-9b1e-4757-a398-3a7b9d385bbc", "relationship--9794e6a4-e825-4143-b82a-915fb841e86e", "relationship--410f7ebf-5a29-4233-8b75-d5188117aad2", "relationship--92297d6d-846d-4b13-b51d-3f6c92b9d90e", "relationship--067b8246-234a-48ac-a92f-caf6814e2207", "relationship--107eb640-5e7e-4314-9cfc-4c149e163f83", "relationship--31e73a19-7d07-45fd-a5a6-e83924560ab8", "relationship--5e813edd-1517-4a82-ba2b-76ba053296f3", "relationship--8017a61b-0319-4cbe-b8db-f19c105f6cfd", "relationship--7b891db3-50af-4c26-be05-8a511e2cab27", "relationship--8953ea5c-afec-45cc-95d0-4433c9218df3", "relationship--07723344-a1bd-48f4-aae4-b5a56ec884f7", "relationship--b8ba0151-1c69-46e8-b97a-6b13871a753c", "relationship--6324e7c0-4012-4969-ac38-5d5b1d5e44b8", "relationship--e40186e0-338c-4f0e-91c5-95c7460f98da", "relationship--ff718d27-1c67-4b2e-813d-8ed0d082682b", "relationship--e8d4c842-2784-4e6d-82e8-9f274b39abd3", "relationship--2a4b5d78-a394-451d-8983-8962fb525027", "relationship--ab3b66b3-6899-4b09-8026-f3cbd10a7bc6", "relationship--06cd5dec-04e9-46cd-9029-0ff99d9760d1", "relationship--35119b74-6606-485a-bc4b-ec5f34ca7163", "relationship--0708b854-918e-4260-8601-3ad2f80b0afa", "relationship--851a1899-dc98-41f9-a44a-90ba053818d7", "relationship--15a0de8b-d8aa-422b-9501-f83b6e86cf70", "relationship--f51d9904-4ea0-45fd-ab63-bcbc3ada2cdc", "relationship--e25f55c5-b0fa-4bdc-92e6-ec6946298f6d", "relationship--0cfa8014-95b6-449a-82cc-a1a1c7f64dfc", "relationship--db663ea2-ba17-407e-a847-a6ddb046b03c", "relationship--2682897c-6d78-4e64-9ba2-76e179e74251", "relationship--8bec4ab0-f15b-47e4-a2c6-0b9dea21129c", "relationship--aeb24442-0f83-4129-b725-28790cd48407", "relationship--89227cfd-9d8e-4bd2-aa51-0ff6555983cc", "relationship--492931bb-d22c-4abb-ad3c-0b9e1e0d54c0", "relationship--3ef4d56c-d989-4b5c-8c13-0b66936ba3ed", "relationship--ad33c0ad-882d-4570-8342-f477c85daaa5", "relationship--0ea3b61f-a29e-4a4a-ae9d-6f3f0319c52a", "relationship--41bc8e82-2ebf-4cde-8832-dbd2a479609d", "relationship--4fecb7ae-9f2a-4015-a444-1f84866c59b7", "relationship--dcf4e965-91ca-4f22-9e00-55b3a1aa7395", "relationship--2f010468-46c1-4ab7-ae5b-5e5feaca0b64", "relationship--0e184e58-6673-40cb-95bd-be24511e6e29", "relationship--570470a7-2850-4399-bce8-8172206ceeea", "relationship--5a5092fd-e9b9-4c4d-92f5-7e510f3fc8df", "relationship--2eb60249-7714-4803-8b79-37520f20f850", "relationship--e39620dc-7a4f-4162-a934-2b0f4a48ce83", "relationship--45ccd6a1-010b-4441-ae63-7102fa821a93", "relationship--e5351ed5-e784-471c-b5de-0cba45e16022", "relationship--2063e4b7-b689-4d6d-ad08-eb688d980abf", "relationship--c9eae250-1e4e-43e5-a1fb-ff4098d20847", "relationship--08c962d3-ff97-4a0a-9d84-af9a20d7fb07", "relationship--516b2301-c9d5-4a14-a512-ba3273118fe5", "relationship--a605bdc3-dfc1-4831-b7f9-a342e57c267c", "relationship--34d7b98e-9d13-46a5-af1b-34b241028a4e", "relationship--a48fe0a1-bdaa-4ee9-8669-5ac1adbf0012", "relationship--b6eca7cc-b404-4c0b-a2a2-f3fa4c422efe", "relationship--692469f9-16ca-4e17-9d42-98644085951a", "relationship--b190bfda-7d01-41f3-b0a8-2d97df9c5b69", "relationship--6d351f65-99aa-4abc-88f2-e156a2655008", "relationship--353848a9-094b-43df-9a42-9e50840a92cb", "relationship--77b07828-6526-4a36-8acb-1a3d1ebf03f1", "relationship--4e39dbce-2b39-4afd-b3a4-95e5c1a9947d", "relationship--fc763b86-cd77-4dcd-86ff-1fe29776b1e8", "relationship--a448a60b-e8d2-4c1a-85cb-6b400c3dc7c4", "relationship--3bbb9eba-654c-4e95-925f-ed709fea33f4", "relationship--dab7e1c5-b462-42fe-a1f5-90d9e45557c3", "relationship--899c4dfb-2bf0-41fd-a5a6-d691024038f9", "relationship--f78708bf-5ed5-4a9e-ba4f-1e92568d3308", "relationship--dd72febc-c247-4339-8f67-2ad2350fedfb", "relationship--e087868e-fdca-4b4c-acc6-da1a2abc79ce", "relationship--1513b1c3-a060-4f8d-8ea6-28c4bd549afb", "relationship--92e1ed4e-5da9-49e7-974a-34bd586f328c", "relationship--63aac522-c452-49b9-b4ae-eccf4c86aea2", "relationship--f107b73d-2fbb-4c8f-a2b2-e45cfc6a5929", "relationship--94b76f64-2267-426f-aadb-5471595dee2c", "relationship--c291d0b4-d507-40e2-86f2-80d508dd0787", "relationship--d10e0ecc-3f0c-421c-acc4-5fdd4620baaa", "relationship--4b09bd28-1c89-4fc7-ac5c-d81824cc4d54", "relationship--46071724-ee2e-4337-b79a-c1ac3f2fbd15", "relationship--34bc434e-ec07-40bc-9f72-b3bd13de12ff", "relationship--521a032b-649c-41e9-a848-8393722a55a2", "relationship--39bd1cb4-cdfc-4ffa-82d0-920bc03a8737", "relationship--e36c745b-e7b7-4763-b5fa-b3248504ee8c", "relationship--5beccbe0-387a-4f02-a0f6-49c5ebd77392", "relationship--1658cde6-2dba-42b8-a1b7-ea369706722b", "relationship--a270bc02-b95e-432a-b6c7-de9b90b78b59", "relationship--6b96bf80-66a7-449e-93a1-6f8c6978824c", "relationship--accf4a39-78c0-4c24-9389-818c0957acd9", "relationship--3f12d5a2-22f9-4f95-ac2d-021fb187ad23", "relationship--32e0c8df-a54d-48bb-84ad-d2f761ff0bbe", "relationship--69fcaf09-58cb-4d53-9471-0cd8948183bb", "relationship--23344d64-32c0-41fd-93e0-13a405c9ef5e", "relationship--0f37cbe5-d732-4d19-90b9-69b8345f499d", "relationship--a667a585-d930-44bb-ade1-5cf59f0e1abe", "relationship--121ec735-3253-4df6-af5c-7f17df8d8974", "relationship--53a1a3d5-6208-4e56-bf34-0d70dbc00620", "relationship--96d6a574-e814-4515-963b-2a9837df26b6", "relationship--dcf6bb14-9af5-469e-b042-db905398271d", "relationship--fee2d4e0-1abf-4c84-89ec-aa9ef8b56fba", "relationship--2a27da74-9275-408f-b3cd-0ddd1e9bb017", "relationship--2f03820d-dd57-44b6-a18c-f222d28c2a45", "relationship--b790e04c-b109-4f44-8516-c613b71563e6", "relationship--b333d9db-0cdf-4316-9e74-999fb96460bc", "relationship--6c83d946-f828-4efa-8f40-8d2fc11cda18", "relationship--8fe91604-18f9-4a7b-a0c6-af556583958d", "relationship--58170757-1954-4264-b27a-18de3b5e927c", "relationship--030e7600-989c-47db-a01d-ae16e9af27ec", "relationship--cf6fdfb8-a67b-4f0d-924c-8a2172f7774b", "relationship--5a663805-4c8c-4683-b441-7e8024bbbe70", "relationship--681fdbba-2f73-4528-99bf-605dd64c0996", "relationship--34f58ad0-4bf1-47e6-85e5-4e454d98a9c4", "relationship--431283fc-06d3-43ab-baef-d9ced813f911", "relationship--d1756b83-14b8-419d-a855-8ff99ae1e8fc", "relationship--d7d943e5-6633-4a32-873b-63d9218de9f0", "relationship--1ff81d83-50ff-407e-a0d7-23591345be8d", "relationship--5f9842c4-5ddf-4880-bfba-5fcb37166899", "relationship--2b35e23c-005b-40ad-b453-e3759524702c", "relationship--7170b96e-9083-4ba5-954a-ad9d909a166b", "relationship--ec55c276-0313-46ae-a7bb-855e2f97a328", "relationship--18e9b400-c18d-4744-9149-1a79fb638782", "relationship--7300bb8c-af54-4809-906d-5de8da83e250", "relationship--9243d86f-6e6c-45a8-85e6-2c71ba267209", "relationship--cfca3568-c290-4934-b476-fd002d7ea8d9", "relationship--233bbb31-5c21-48d2-98b2-fbb16d8517da", "relationship--6dda2a5a-7da0-40fc-a444-06ece65e6903", "relationship--576e4981-1565-4073-b985-26a072c45d0e", "relationship--92efef89-c69c-447c-b161-410765bd2d91", "relationship--0af6ce04-7991-425b-a4ac-6a71cd7d4ef5", "relationship--211469a2-7a70-4a01-bbae-1404d288ef02", "relationship--f9b25375-f75f-4d4e-853e-5be476a9a5dc", "relationship--076e9f85-26b7-412d-b8e5-5b87baf482f2", "relationship--c0652b3d-34aa-4813-a549-074896a1d2d4", "relationship--b49fd571-a2a0-4599-9167-10afb16cad84", "relationship--774bdbc9-9d2b-4402-9fb6-3233f18712d4", "relationship--6b1fa41b-466d-4313-9790-5860649443ce", "relationship--8e5d0ac3-70a9-437d-9727-dd4b596241ba", "relationship--f0d79dbc-64bb-439b-a880-4742d2ff699d", "relationship--f6d302c6-57a9-42c6-8809-9383aa05ada9", "relationship--776693a7-8294-4780-a8b3-5e9c6ffc0220", "relationship--e8a46355-f74f-4047-a6e0-f36d883ca1ca", "relationship--bb5b6ca1-ce5a-48f1-aea1-03c4015983d1", "relationship--0374e58f-381f-4ca3-896e-cdbb1c2f40c1", "relationship--070846f2-f1b9-41cc-97f9-91aedf97086f", "relationship--6be8ef60-3fe5-4c39-95d6-41591d1387c2", "relationship--1ed96be6-f044-428c-872f-9c6c53e66b13", "relationship--2bd22249-d34a-4dc1-bf17-91b32fd7a86b", "relationship--f3d0c161-811c-4053-b4d5-9d60a910171f", "relationship--44f68702-6054-47ab-b2f3-f66d9e3f88f5", "relationship--c7fca1f0-9fad-4542-a4c4-d1b413d75a8b", "relationship--c1a7b96a-f8ca-432e-92c2-951d54153172", "relationship--b80180a4-b7f7-4476-b690-61f5cad1ccd7", "relationship--b84068dc-e444-4b9d-a826-08bcd40c37c4", "relationship--8287779e-c81c-42d0-9ff1-1fa17ee079d5", "relationship--8309fe3b-c397-4546-9cb2-a1953305fa21", "relationship--9b58bd89-ab17-403c-a64f-7cd63c7f180b", "relationship--58d32771-d3bf-4bdc-a068-9fa4edd9250c", "relationship--258107db-0b69-4f7e-8110-9e200d80e298", "relationship--4dcf353b-4317-465e-b589-393576d69ac0", "relationship--46301d68-14dd-4f24-805b-e1951f2624e7", "relationship--3fe496a5-cfa9-481a-8c11-fe3f24244203", "relationship--aa70041c-76a3-4e5c-a884-a7b5f13a1440", "relationship--b17d6c74-b2ee-4d72-904e-8f21ca608a81", "relationship--330b7ae7-c5ba-4ebe-a90f-c1cc254140dc", "relationship--9365a854-d907-47e3-b955-b1188036d6cc", "relationship--27908755-a66d-4127-8b80-398bc4b25db9", "relationship--be3c7e2a-7650-48cf-8915-59a47dc4dfd1", "relationship--5de1a145-c784-4206-a6a0-7ab1ec8158ef", "relationship--494424b6-b0bd-4f60-a602-8878b4cd63bb", "relationship--32e32d68-481a-4c42-9de8-865334c7430c", "relationship--8935607d-23b7-4219-bcf6-a4d349b8caf2", "relationship--2fc10f20-fe46-44df-8d78-4f02a2815483", "relationship--63fee1b6-b272-4a41-8dd0-0df2b36ea10f", "relationship--74462801-29f0-4d69-b0ad-4235e4b89ed5", "relationship--9900ee62-275a-4ba1-a714-0f5f1552c9e2", "relationship--fcecc279-5b3c-4deb-9d86-9ca139b749e8", "relationship--5a27e91e-c123-46df-93c4-049e086c00cb", "relationship--6ac440a3-1c0c-41b7-af76-42f688983f04", "relationship--2867ae1f-2f81-407a-a8da-0e40f677b077", "relationship--23cd48c0-02e5-4b12-bc6b-34e675e37e30", "relationship--f3040069-bef0-433d-aa21-1213b3e6a917", "relationship--f89f038e-241c-4f73-9bf7-7647201035b3", "relationship--51050a65-921f-4b42-ab10-8c64c9018602", "relationship--c20a529b-10b5-4327-9986-2aafc2c1d1ed", "relationship--9e65cc94-b1ed-43de-9899-5dce47b5d171", "relationship--ddffe33f-39dc-4939-99b9-07cdcb09c9b0", "relationship--54f602ed-e6f0-4a7b-b2b7-7d99e99e5b86", "relationship--5ffa63f7-0c83-40c2-b7f9-dfb2af9c5acb", "relationship--758e4575-851f-4552-a83a-7f2c32f543cf", "relationship--0197f090-1007-4c75-a0f8-188e019178f1", "relationship--dbb0a0a9-0818-4757-8bdd-4070612335b4", "relationship--07d8ac54-6aad-42af-8d94-148a65a4ca18", "relationship--3024a412-346b-447b-b401-4212da05668a", "relationship--1767b02e-49dc-4251-b4bc-9143b867727a", "relationship--77e2c670-e83d-436f-91aa-406bf2871df3", "relationship--e713f53d-c95c-4f71-8567-c45da92f4c57", "relationship--89433ef7-d2d5-4501-9c94-d8cd8a73ff00", "relationship--cea448d5-271e-4caa-b411-98b82bc4d902", "relationship--21c9a45a-293b-4328-b8ec-2a19d49f3a1c", "relationship--f669556c-a9bf-4050-b4ad-d91af57f9b63", "relationship--9f23593e-a3ec-4e91-89ac-fc99ec4d25f5", "relationship--efee55f2-b24a-4196-b684-c98f692e8aae", "relationship--5fe3a49d-ac4e-430c-a41a-7e3f65ecc673" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "osint:source-type=\"blog-post\"", "misp-galaxy:banker=\"Gozi ISFB\"" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "observed-data", "spec_version": "2.1", "id": "observed-data--5aa7b644-9558-4b2b-8deb-4e74950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:10.000Z", "modified": "2018-03-13T13:32:10.000Z", "first_observed": "2018-03-13T13:32:10Z", "last_observed": "2018-03-13T13:32:10Z", "number_observed": 1, "object_refs": [ "url--5aa7b644-9558-4b2b-8deb-4e74950d210f" ], "labels": [ "misp:type=\"link\"", "misp:category=\"External analysis\"" ] }, { "type": "url", "spec_version": "2.1", "id": "url--5aa7b644-9558-4b2b-8deb-4e74950d210f", "value": "https://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html" }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--5aa7b657-db9c-47d7-a90d-42cb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:11.000Z", "modified": "2018-03-13T13:32:11.000Z", "labels": [ "misp:type=\"text\"", "misp:category=\"External analysis\"" ], "x_misp_category": "External analysis", "x_misp_type": "text", "x_misp_value": "Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years. Banking trojans are a type of malware that attackers leverage in an attempt to obtain banking credentials from customers of various financial institutions. The source code associated with Gozi ISFB has been leaked several times over the years, and the robust features available within the Gozi ISFB code base have since been integrated into additional malware, such as GozNym. Talos published detailed research about GozNym in a September 2016 blog post. Since then, Talos has been monitoring Gozi ISFB activity, and has discovered a series of campaigns over the past six month that have been making use of the elusive \"Dark Cloud\" botnet for distribution. In investigating the infrastructure associated with Dark Cloud, we identified a significant amount of malicious activity making use of this same infrastructure, including Gozi ISFB distribution, Nymaim command and control, and a variety of different spam campaigns and scam activity. Talos is publishing details related to ongoing Gozi ISFB activity, the Dark Cloud botnet, as well as the additional threats we have observed using this infrastructure over the past couple of years." }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f870-49de-abd4-4dd9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '001c4d2a65dc725e1d616078834e32ef5f3f42c565165493de4997ea81451d30']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2404-442b-8b73-4f6e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '0084b71d5f3c558f05d887cd2843e6d15b77924144beb619e75e9be445d326c4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-76cc-45bc-aafa-4007950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '01b623a37359246c634d3a4fbb423fe8f23bc8921a6719be6b0b93cd0e071253']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-714c-4e23-a4bb-45f6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '02adb1fdee7b1306e2ba7a07a052b6d390d8e939c807b7b6515589312d072e79']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8148-4f2e-a8eb-4377950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '058f5a5091489fee86a000a55181e44d4acb5adc81bf709e506c972776cc76ca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-826c-4e96-a3de-40ea950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '05e4dfeb72eb015cacc9f1040d205d7f5205a6d4d29eed5f1221ed1ef0a8061e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1c70-4076-b9fa-4863950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '076c6d0b22fb063e85d1ca6be08b9d5b202b2a543d7a9aa9a2f525acb3c8900b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1948-4b18-a208-49d1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '07c2f262f84c7013cb83f25027e86d308f6a7867cb777b978ddd78e999fab187']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-368c-4c37-b61d-4a93950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '07d9637fff6a7974be99206e6b767653e3ceef2bd91531afa300e1430b8eb800']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c3ac-411a-a6ab-4f86950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '08281fb7677a651351a9b0a1ad5c4dace6748104d210cf6f9aecce0935b31007']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-5518-4149-8a37-46bf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '0a7c4d325455d706c3f331b595c1261e78bf59ed0c0111365604203322b1e177']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-149c-45ef-87ab-4bd4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '0acc741c806c8c0bed64d14d6a9d69580ece212e6517ffced865c2be31bf72fd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b544-43d5-8a8d-40f7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '0accb1cd97ab92a9b4b8829a36e081ba8c5ab8944928d79502aff2f141dd999c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-80e4-4da8-b5c4-4045950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '0b2a23066f3601cfcc99b7555a552807946c3da8c0a8519f52b4175e72828c31']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-44b4-493d-8334-4127950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '0e3de5470c2f6687efee85eeb7022cd304b880118fdfc23eee8761ce3374635a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0244-4b14-8499-47f1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '0e8ed0237d187dc5de5406b46f248f090fa50035bdb927944853268e22c3016f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9cac-481a-8908-4b15950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '10e90d6fce4d5cf1c3f4a9e779547570986c948a7ed2d6cc824c279f73d0589a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4a38-48f4-8738-49aa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '11aa9301346258b1e950607dfdb37eabf874e93406c1454c9a4bc905d1ccf925']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-e054-4cc4-8229-4e39950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '11c09386ec4cc88136bf85bf2437a28e385d42fea053e95b3d6eb5995e0fabc3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7cb0-4347-927b-41db950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '123fcc8bc29c954002a10a992633d143f0496bf7b942bef6741aae761cc9667c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-07dc-4f64-bdf5-41a5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '12596ccb9a77db49e5dd8c2b38779cdea41f78660c8a0b9d0ccd80bef004b2b6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-a62c-43c4-aeff-4bb6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '125c1da1e9c3806a36d83676288e25226be564dd8ae941df4b3fb3f3a1fec31c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-66dc-4cec-b087-41eb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '134692b2f723e62bf9cb243e69bc7d4fc613ecccd02d44072e6097ebdf34ce8e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2020-4a5b-beda-4e9b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '1416ce19fb29b01b3e89752cd2470f9390fa76ddf6a2d54a6282e85bed7b4375']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d4b4-4c4a-95de-4121950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '15077e348ae73659d6421d206fa34055710689deeac1bb2d1c41d7a52adda610']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7df4-409a-bd84-48f8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '17cf8baece726646732d14c54c565bb27c941145d10803809ade30280634e24a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4de0-478b-b15a-4aac950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '18de35862022570015788dac8f5f60d47bbdf7922e5b75da278828eac1d9cafb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0ef4-452d-a826-47df950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '1e8d3218fc242a82f105bdd1af3e5e6cc6865be66241914d0d51b332c71298f4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d06c-4ecc-b6eb-4e2c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '1ecf353cee0116eed985085707c29ba7a006da2975863f31372b3bd6a0ab7974']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7560-41fb-9140-4984950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '1f14d6590c2f3434805d0967ba7bbb822ce7ec39a89b9b10f2a26d11176cc77a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-3610-4626-b558-47d4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '210397548a6178ea29fc4567328524b41592cfd60fe1a3db543ef49eb37f0a7d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-08b8-46c8-97d0-43ba950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '21474c9dc0a59c8b4a9bf9a63ce2642296c3a8bd571f013f4e0744098a46f7ca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9a88-4012-ac17-413a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '25708004887ea068f449e989bbbec07282d14c3ddd8cd03b4af492143a03f397']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4b34-47cf-a040-4d5e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '258989c785d7b5d50cd4a9a5c2fc6b27ad84912c80c079c896db23bb64ac9772']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-e920-4a23-864b-44fd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '258e9ac0aff2d08496427b988d5f98234d3098329f116202ac1a1c9e5afd272a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-93f0-492f-99ed-40af950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '27804dda3c5bb183970cc7c38ef0ebce44be5f9f0ffeea4f224bc5b7fa91953c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-26ec-4ccf-86d9-4671950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '2811f5cd04ee2907fb8d00e88a40dd32d95fb2c8223ed490d578c44cda923608']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c7f8-4bcf-b395-4013950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '29970afb6fc25dfc761fd513bb29ae79cef090d4f667a54fd5c51b9835521c93']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6968-4622-a5f0-4764950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '29e66d89af2621339273b64b45014e661710361591c514b950092be82e5222ba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-06f0-40a4-8571-4d36950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '2be736311b9fde1539cd73b19eb742f6871e423216d66dab66e7914af52fec19']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c930-4b44-ad5c-4c5f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '2da98e19b1642bd55ea8365795f030789508cd88fbef81ce16877436ea2c1484']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-658c-480a-a11a-42ac950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '2dc8a22cdf1b5f9eedfd45cc7c1e224714fb9ceb7e06dc25b69efb9f45413b0a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-182c-4d0c-89c7-4d03950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '309d3a5549fe176866c18d11bbf03899cece1b666e9b28358daf9aba3efd2068']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-ab8c-4a40-9178-417b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '30ecdc16bf9d416a2729d20b1bc2da466e58512f501395484828ef3446a43686']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-66c4-45fa-85b3-409f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '30f185c47f29987917fda34fa979573f19269c70bfcb9457c6a1991a04953a40']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f6a0-4f95-80f1-4fe4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '316c77088d181a3dc4021ac2631fd1531f9a9602db70b90fe6901170ebe43c82']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9360-42ca-811d-4a7a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '31ac22dc5ed4f7245e3988d096ce8c78e8d8edb95ea83d419bfc5c0d6dcb8cfb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-5280-40cd-ae93-4305950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '3234c6726f375d48cd7274e1e2aca5163ec20b8344637f67990f2ce1df587c62']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-02c8-400a-8bad-4957950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '3235914dde70f5f23899489bee7880fc5c121e28442e0349dcb7e266f2aab595']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b5cc-4ae3-98d7-4776950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '32636046a3a6d97791d0a48ac59dca6c1ee3a030bdc33610c2bef1c726487b9a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-5354-4329-98a4-4780950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '32695d63215d0bd76887f1373b89607f6b73b193f37f044a518afe3db446bd65']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f1a4-4087-bea3-4ea4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '339db83eabcdaf0c4b922811e6f98b36a4d6dcccf7f03ac41e3455ca2701f754']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9c10-471d-9443-40ce950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '33a5975e9efb51377b2b5fec1b4313e87d4cef1a7858390e64ddcfc28e1267c7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4bf4-445f-b06a-4709950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '34a7e963ff82d073b6c2b2fda7bfbb9ecce9bb4e437be856252f14de6040b8ad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f6c4-4127-84d7-4481950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '34bf67c997bf5b450a13538ea540080a1c97fff1c7453d497acf28539cf82464']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-a900-45bb-8db5-43b5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '34f08e0d3d5f430e1a3b3604a9c5cb26850967b6f4468a5d1146f1681ef99dad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6564-4b4e-9457-4840950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '34f6bf5de0b379b5cc3218c3b81c23fa590ebbe4488d35fdb5ba241ce6d3811b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1228-4f85-b81a-4cca950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '35ef838fa56f2c30dd62cf97421e8d4c322d593992560f1631c68492a0d39150']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c658-499f-9c7f-4639950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '374595d82e93a01325099581517b4bd8f456cb7c1c651f1a3bf2c6b084e4f588']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-76a0-4f0b-852b-447a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '37ae9bf28a5761205b13fcd0c1d5790ee2f6685acbcbbbc18eaffd08f1879494']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-210c-4d26-9ba6-4f2e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '37da6dce2dd7ca03a502c53f0f8dec0c318184eefb694976bcc3aa6b5fa5a7de']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d730-4148-8525-4584950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '3903705c0e2eb3b9d6c289257aa515c987ed06eab3051c7c68369a4a64d93ecf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-86b0-4e44-9076-48e2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '3978407f6443e5396459bd2971b27cfbc5297aadec810bc0dc15f365a257b58d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2884-49e3-82ee-4a65950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '3c8336cc1d90a6bda731cd722bf83b41c7e67ea124db190cbee93f5e93f0aa29']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c288-4e9f-8b61-4dbb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '3f930936e2f69619c2f0894bb65b9336052d77c8149958afb391dcfdaaecdcde']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7e88-4de9-891a-49aa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '3faa0bf985680899b7ceeb5d9e8e502c1d65a113afd677d41b9f33447e46de83']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-20c0-4cb6-bfa1-40c5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '41de9e4c043450b3d2342836ed5f56217f1dd5161394d3d52811709c3584d44d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-a41c-4020-b632-489c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '41f8b418bd12776cd5bd154226d2646bb766bf3cfa95b41d03003386ada51789']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4d5c-4f2e-93b0-4093950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '428f8a7ea9ae3e8c52f06afce39aeb65468acceeba9c77ed8c84c740ec61b5b6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-df90-4f4f-9b4e-4a63950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '43119f84aab92fb79d14eab9e40bea78f0793ae323be7cce04130b65f2861b5e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-a4f0-4e81-8eec-4cca950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '43c45ca9b13fc4b0a5c80b896e219ff376eb49d2ab9d3e2ddaa7a2e743e97289']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4340-4791-aee9-4be1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '44f52e01e59940e2d22a7b6473a76fc8bf326c4981fa4dea0f63234e62e151ad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0bc0-45ba-8b52-4403950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '45fad51e141ab93a26df72010aab0c464da2979745b62066a5810e7b5dc370e1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d120-45d7-afb8-4446950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '4949af73035869e28552272ed9c79511027ef026cb79d065f0775b50e1e5008b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8bf4-4e5b-a767-43d0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '49580ca29529de4ac3ce037c6bf5b9c675a9f770c7ec4d1203ce19391e0661ea']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4218-4619-877d-4d3a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '49d2c6c0ab28cc428c3e0dba54027de788d65d635e21577172fce0670c31a3d5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-fbc0-4693-897d-4707950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '4e3570696f61c6fb49f9a5e4041c9552f84ad2954649f91e5e191457049e776d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-adfc-419d-8938-403a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '4e6f7d50b2c4616421f4e662eec927b9f60dbf720f0e3dea25d9177c56f329e4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-3be4-4505-b752-414b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '4f268fc02c92d31707c728858c295b61c1a199296001e90e7a40bf56ed7d9faf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f140-4cb8-ac2c-4f23950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '4f47e319f1ffda90d84a31c24f6eac04774cb49b0c5062614231515794df6ed7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8d38-4694-be68-425a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '4fbecaa6c190937aac19adc6ec5599a7056305ffebe65015e22da2a324c7c114']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7d90-4226-866c-4f3f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '504af6417f1d6f4307b046f70104d604b3762bacefb6f4eafedcc35a9fc7d35f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-52f4-4f1f-9b8b-4b42950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '50625750d4338ad1698b2216d0b289cee2666ac5ea081b90b11859ee13c92a78']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-3348-41fd-bcef-4281950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '510d7394bf01f4c836524d08cf7f35bdf15f304e4b7b8287d8759316b275e396']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-59ec-4d83-81a7-4c2e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '5112d0c215a4ab21157be3752b12c4a5dd663b20a0373f686e8a091341d3ac52']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9224-4151-bd6c-45ee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '514f5bf6c530f0baa7697e52dfc22c2199c378765d461c573b26ab9b0cfa71a1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d09c-431a-a9cd-4fcf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '515651cc16fe74451eee5d02ed357a2cf41c5f05ef81140620f1f472fb3043bb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-06e0-47e9-a955-4398950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '519355607d92f31136d21b8ac11a2927e850de7b757af62c27e28de1ce4c1c44']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-3f18-4b5f-8034-4cff950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '54b8b75b4714b1902e0bd46dcc14877b6a329e88ef7068a2855710b39ea7d13d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1b84-42e5-9a18-4a08950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '56b7d25e2ac670add082a1f563e5b6c18ac60c0883e1ca8dd1d069f443c43679']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c208-4996-88e0-4f17950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '57fdd5ceac9957edf992b03fb4f888d2d90991d1d8148f55f57c466127ea2e67']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7700-482c-b0d8-47d7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '5abc641c6f48c2ef5e8886085e375cdda5ab5ea47b2f935c1060232e8795d030']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1de8-473c-b68f-4e87950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '5c40c4454fc289f9b240eb5419adce33b4b146753b5fb4404aaad4ca81ea24e6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-cb10-4724-b192-427b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '5cab554b4aa4864cce93e6853142cd361866fe37bb55e13711163ebee9286662']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7e78-4824-ad94-441b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '5e3b091d32b67cff249bb8667e12b6adb3c9f3315fa4d0e6e0af0924fa5306ff']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-35c8-49d2-ab37-49e6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '5e669d80d7dde5dad3b86547f4b9a89dde17a39470a929d829e84a90442d986d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-04ec-4be5-ac44-4875950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '5f0028ccf2b04dc60b8589a1f66dfe0dd066bd6ee5a6b6dd2cda57e42270ef54']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-a468-461c-a765-4c07950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '5f0ce2e522623fb51201212af72af0851f1a3b9c2f06cf74bb26d73eebb3fc14']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-48f8-4593-b032-4597950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '5f654112de0cafea313816ab3ef06818b438997b94fc28cb62474c17a3426f4c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-e6e4-4330-ba5e-45ff950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '60fe04943eb87375122a70d1672722e7700394c5d7427660bae1c44d902e2017']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9344-4470-ac4b-43ed950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '610e32c6dbf24f80c6a20648a139b06ee9ef255178feb8c788e29bced4016443']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2a8c-4b72-ae25-4ec5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '628460a30534d48bd4e09d9ed2e524eb30f15dda804618bef73b28f8e6a33eda']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d23c-450d-ac23-4b07950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '64a7fb913f2507a283917dbd3d22ec8335d0cb462e3d92711cd8396b3cf09edb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7e9c-4adb-b5cf-4aca950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '64f64e84b753992054214453ffc55f0b04f8e424d2b7610dc134c75f7da899ee']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2520-468f-8dd7-4b88950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '65f4b673130e7858063199c89cf12a100484bd4f1588eedc01ea9c46e2d7e11e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-dc70-4aa9-aa01-4549950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '6667897650cba6e393345151f9b44e62bb5d1eb97888e4fb569d79d7fe89b873']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4f64-4203-9685-4875950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '6ab56fdc5593974aaea168539cdf70b33e0e18149a335d0762436f8d7cdec3ca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d324-4d72-960c-482b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '6b5b633e0cf8ad1537f89e9783b2ce771b2097047af940856277d56a2b04bbcb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6170-481b-b9c1-4ad2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '6ea19ff6b921be796960f5c575f4021919d69172bc4fd848d70d65eb1fe23ea4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0024-473a-9229-4f4c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '6f3ad7b311f7f052accecf3a434418e499d3f2e7cd6374c15d8d26a3f1785c01']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9dac-41d9-a065-493c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '705876c51b6e6c32f3be3d54349c7892e3657535a02f28748d186aa4f3a710c9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0b8c-4f2b-b3dd-45d4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '70dad100507788e071b1f3f8be7c2e97a245b277510dcdcf31db82b2f826edf9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9654-4488-a98d-4dbf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '73273151aa0dbe419d1564522a17d408d6b4fdf447571f323558b7e806e52d9d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4f98-4153-87cb-4ba4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '73c3d7970dea0238c98275f925f18d4f3a66237a6b270a2732cca31193612f90']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d998-4817-af13-43d0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '74072ce0ba259e107a7f6549eefbe241831b257af8fca9a834b2b7e9c1649791']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-92dc-4b7c-a3a9-4e94950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '741a68002907eb05a140dd4b1000b09f9ea9f0a9ccd6928e124db0e7c535b5bc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4964-4b03-b190-4a5d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '7726a78b870ceab360e0c044b7f6a10a61283c814de09e870e49187927bd71bb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-deb8-4262-b433-40b9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '79905733dd082deeeb5dc87b9f394c3bbb06b3097cdb53e7ce8bc3c4b460809f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-70ec-4d5e-a17c-43c0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '79f9cb65e970ea7d4d6ad21a3ee13a7ba356aaf355d67c5a4e75495f8544a0d7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-251c-4484-8cad-4485950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '7a3cba962ba9a73dd99f68a0ab7c0fb77e3268005e6645827c0015d368acb0bf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-be58-47f9-878d-486d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '7ae9929902023ab4458ec482e9a5cb701e68862b2a1168fba6fa8b6a3e784866']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6540-4c46-82f0-4d16950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '7aeeb897d0c1de47500ea23b65a2266e7239f2b061ef4aa8989164a4e99e94bc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-e388-4170-aa6b-41a7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '7cbcb52a2d8de4b64ccc9b885e43e39823de8c327705abe45b8bcab2b17d548e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7300-4e41-9200-48bc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '7d1c32f8f47355218320a793c3f0f74c6fa7a19c22f7d01eee947f6960dfa466']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1218-4524-8f7d-4005950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '7dac5f0299bdc8a36df6ca4eac7a649754a8c706b7211108b26cb0eeb1d72a67']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b518-478d-aa5c-494b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '7e0ff14ecaa2ac825c2161e1e859b25e33cca421d32de1cc009863bd049e98e1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-5b38-45ff-8dbe-4ab4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '7e270f53bd36b34ef6f9e711b1943b582c95a7bac27263356e9d97273a3dbabe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-fb18-4c6e-8ae7-4d8f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '7ec64290f1e946d9d0c20a03d9319f92e401ced19e0efe0d8770db75cad67278']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7708-4cc2-b7b9-4057950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '82903f14bcd5821f6b0f2682b1e0d32c77c760812b23811da0f1a3003917037a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1a6c-4d06-b495-431e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '84639a788cc03eb09efb7c1b60883c37e5ac06eff0bff6d38022d64bf56f2330']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8a40-4411-ad8e-457a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '8587dda211ef94435a1ef9f1c4c299afacc179fd59fe06c74d3e75506d084277']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0f2c-4df5-8dde-4cf7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '85962b40ad53bbcb04bc9536bbab5244142b6239f972cfffd43d3c6f7956849c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-898c-4a7a-8b78-400f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '8599d1ce8abd86248f214f44a87cccf8e428c59451db3f8f09606c3d15d99d74']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0900-4552-9ef3-471a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '862432919f8db0049b9a3d59a3511898ad9bc220c0c64ac4a4cb97caff745326']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8748-499b-94b6-4c18950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '86430ccbafcd1cc2282084bd416592756765d744cb6b78b6aedbb7de27da9ec3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-29e4-4bab-b903-4a4c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '8697c6d9c186cbbab22974817f957fb41cb8b288667e7c38c6df981cb3386f5d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-a4a8-42dc-b522-40a8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '869d9b7e5f9f9c79e33e359c131639b870aaf6e673ffe6b05ae57f4de3bee7c1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4bf4-4765-b725-4d3a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '87ae0ce6d13939d0f048889d02da0f7faecd7707705b05b387b8e2cffaea5312']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4548-4c1f-80d7-432d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '8911699cdd4ced8731dd4b0f5269f52073acab270bad78aa4d161aaa673e63f9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c458-48cd-85b2-4cfe950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '8a02499298a1d12223a751a288092e6f196957e84179b91cfebb6093ac15fd54']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-59ac-4841-a55e-45ca950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '8d0aae0b927fcf6e3162d95b1038fac8281432f4f94fc294472ad3d7d1457929']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-e3ac-46fe-a8e7-4200950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '8d3b61d3137f802673644ecb3f673128df1afea1b96926283bb007b7dd681602']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-770c-4027-a091-4f65950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '8d74ae7b6a50c748ded262a822aa429a65666b965862ff2f4edafcd3a6f622d8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2560-4b98-a78d-4145950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '8f4533d820eb7f55e55c9ddff65cb629b0bdbe97d0f14d25d5d820acd18938af']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b6cc-40fa-9f5a-47c3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '901354b147cba30d916c0dc57a74fd24cfb44c20bcbe950aaff3e32856ea220e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4e78-43cd-bd3e-4d54950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9032651ccf32fa0acad949d32bacd2220582ac13c364033641413457dbb3b3b9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b6e0-410c-94b4-44a7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '903b1d2fc5f0fd013506915bf31dccf18f96a12efbfa89fa0f27410b98197518']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-290c-4434-9b8b-4328950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '904285c01b8b7fda39b5ffdad48101a2fb3c2ea82bc47d480383bf11ce926c7c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9c64-4320-b308-4873950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9094ab3ff3c91dfe6228bf3d225433b16442047fa63ed5e00f15dffc5676dac6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d2a8-48f0-ad1c-4722950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '90ca9d15eb5815f8b3302fc35c8c67fc7481198a1c91eb3970799fc3782eba6b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c42c-42d4-938b-4eea950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '90d3cad13e03fa3a586c84deacd68bf6ae37f60ea030d1efaea5fbacc1a1e93f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-866c-45d2-bde5-405c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '91f122e42535165233ef5657279eadcc15bd90e723a13fb1b51ab9096b6e582d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4e88-4725-81c3-4e42950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '92121041f5102caa8e0d95a48c32161648fe54c0f839ec54c8faf1595b0ea3d3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2b58-482e-9fde-4e61950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9248bf0411d30d4f1616f3a2d7a055b4692c87717033a36ab630ba20ff599489']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-eec4-4dd8-8db2-467b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9371809d87c41170ba8bfab3241f5b31d664035c9a249ba6541ff9cd57cb374e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c2fc-435a-a186-4bbf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9511cf49008d992c336dd4e0d944a307043f9ce47fa0323a04585145ea18c0cc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6ef8-4d1e-8f32-49ab950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '956c3c0a8b57b2322cc7269e08c0ecab13772093b964f6637a28f26c087f2783']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0514-4fee-bf75-4108950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '97d6ad9fc1758ed1312135fb283acdbfe4c8af484ad84be035886d630b5b488b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b2a0-4437-9269-4361950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '98861a1dd370bcfee107017e75cf1d527fbe8845181042de3493d0d0e7a624ca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4a4c-4bca-8b06-4d88950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9894ba3b6c110bcd9b245058f8cdd8943cb7515b53cabe7589368de005cfcbd7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-ddac-4c47-a376-4ee6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9a16fe595e5e8dbe0604fa4d307250e4f47a86e7793378b5df7b16891ff21bb1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-84f8-41bd-b764-4c25950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9ab27bf6a30dd835d19c438bee3feeede1749c0ba9ef42fd601830f3950beab6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1920-4bcc-b945-41ae950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9b48f0818738ddda0adce3560770e8618dac6bd341d5e116d967562146d51a7f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-93e4-4947-99a5-4bea950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9daa9be7e3d45f1a04476c969a8f73362bdd960ae3b5b5bf02ca01c958ac1db7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1fd8-44de-b5ed-4e96950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '9e0ec586bb991db7b41440e6ab3988f7b379c17e7a8963e8f41ab153960b5b24']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-ba40-42e6-89ae-425d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a0cf68c10d1d9ce0e73208e6e6bad32b2405d2c74c662dc7b20f9b567c4dda64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4e04-40e4-ae9f-4a14950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a3d86b86f08def93a12afbbcb1748d60859277c3515c2fbf211a1e0d9cf0998d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d9f8-4bd7-ae5a-4e27950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a51dbcb87d67fc1edb0be26d35a632140383b47d2ba16c053825b551cf152f3d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7014-478a-a6d0-4862950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a52192465084e717ab601dda5a7d7f55530bdc206c84f634cc12467aede8c6c8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-fcd0-44a2-85ad-4790950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a5c8ec7e44ca6bdbb20f1234df90d2937372f629f9c0d39d5f4eac0c8e716653']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8ab8-45a9-8e38-4331950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a65093c35d1647563f840e42893d09809311f34c3861c2c9db479109ee31df37']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0d4c-46e7-aeaf-4b1c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a6a8117150a1bcb6ec16b6c002a341ab54a912190421cb404d147438bf39474a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9bfc-4e2e-aa1a-4548950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a7b9ddd84fc86c1eb09feba86b773961cc1d459287eae364bbe750533ac5ceb9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-3344-4bbb-937a-43a9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a9992d6d8a97f54e2b08ac58e0a50bacc6307033a91315e3ff1bc0a531b3876d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c258-4cc5-9832-4006950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ab0f7d145f178f26444e9c5b1815911131a7f6ba4b41647280320a363e626b1a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-57ac-41e7-a3ff-4614950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ad2cddbefebafe1b676c5429ce39ab46cb7cb947fa7f4ce4437e2bf8dc177cb5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-e148-463c-9894-4aee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ad5c791ae004cbb1aea0a71fe2f8bc014cba005e8a20e16042dd4f41169dede0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9e74-45d1-b7ff-4bc3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ae80eba1667456db827400aee3639bc03380ce4dec806c4c1b0485ce96b99bae']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-3364-45d6-bff0-4e39950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ae81c89e16a9e3fbff5b2054441c090afdf659470127b79f9662a5a12732049c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c91c-4110-8559-4be2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'aeb1e902075da6dc2d2526751276cc6602c819bbea2e668e9dc3baaf9d177adc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7b58-428b-ac68-49ec950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b044fd1e0ae000eeb04d0529b3920a38f839e910bfb6bb9d0837da22f0ace15e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1fe8-436b-86c4-4df9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b0e2cef91b30ab96b6893659537a44986767272dfc2438af8281455af0f892e0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c8c4-4b2d-a50f-4efa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b16db20a9a2e19b318d0ecfd8e9253e16499d8498156bcad684c39a9b3c37c4e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-5b5c-403d-8d2b-4f05950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b1f2c4c3e837e4971a0cb2db3763e8785b0c34a65c073a890963b35ead55eff0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f880-4cbe-a2dc-4366950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b221d49022a39106207a6630db8a135d1803178b9d7e536525979c578184f752']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b2f0-4cb9-9e81-4cc4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b2b0fe8835f5cb0a941b876b48d7fda262b85b6fec15436e48fdd2003ed914d4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6f54-4307-8757-400d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b3dbbe79bdbf9e6d6a8eb1bcc9350f847b76aaf304bc981dca9fdf281ba22360']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-15d8-44d3-973a-4bff950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b41c8eb7d5907d0a13d03163cbb4114a2983c4dc00237aab00f1a632725c27a6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-a5b4-426c-bee2-434e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b4898ad9f1757bd6f127fd9a539f393004654608037ba94b3a62a81166fd1163']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4274-400d-9538-4ccd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b4b6baca1104b0dbb289731c3b206cfeaefe58a23f45182e0d4f44069a7f5f39']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-da20-4a47-97a8-42c7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b4e43c40405579f7e508e5d546975b4b2bff83a70d7dfe98fa64dc407894d103']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6678-498e-a7ec-49fe950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b5a71e35a190c091720e643f0dedc09c07cd481f11cfb23866f2adecff8728be']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f078-4f03-bd9f-419c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b67584f6baec97528656dfbff7749f7eb355497706359db0c4bd981c15b3e854']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8180-4bca-8961-49e5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b6cb8872c9c836932cc4d9fa84c217f8cdd2e840d5f1f34441d572aaccf6c844']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1d78-41c9-9040-4eb3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b7fe03048f861222f9a161369e5eb38f67b13eb0de4050be089b394c7f30c593']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-a32c-4cd7-9a9d-492a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b82fd4927cc9347513227a8b8d0a206a4678461b16c3acb5f6add2e5d1f089dd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2fe8-43e6-834e-4af1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b84cac469c097e1296c00029f8ffb1b7e12fb791d10da6e01485079a7750958c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b470-49d3-8e5a-4350950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b930d8c294a10f76e7dc9fbe1b257142fa5abc4bea0bc51ef544117b4ad51e29']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-42bc-4775-893d-4fc7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'b964569f2697dcb72fd36076744995eec99a35f056826b6aab2c929e908d48ba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-cc58-4f5b-9987-42ac950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'baf336f2048ed4de6b342d4cdf8b6ca4a95cf83167c2f2c044c12fd85923ed87']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4cf8-4ff1-a660-4271950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'baf4586c1fcdc32fa2ac1441df17591aa34f54d842ad596abd2cadfc190f02e9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-ce60-4e35-ad65-44b3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'bafb6b31625dac34208b40dfbd0d61632a0096e8eac5220e80c4b8225fcb5b61']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6800-4a6e-8df0-43d5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'bb06ec141b6382a111c20c70898b161f2287dda44a7024b949cc91fab1d3ca62']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-e7d8-4cdd-8926-471b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'bb4eeb211e54b55d35f7b46ab85420e2ed033c0594f906aef7495430d30bb7f7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8434-44f4-9140-47ef950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'bcdefbeb609a3d839518b3fe9d77b138e4b8a7f3208e963650a5a2aac6373e25']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0d6c-4d1f-857d-4192950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'bd7138482a831b4a81150dda541b2375a10796dd365e5af441caabeea42bf455']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9320-4dc8-9881-417d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'be5e420236c341bac83cdcfe4e3ec58ac9b32ca2c36af1596bf0e3642ab29d1c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0fd8-4901-b8bc-4743950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'bf490a1a63c7e23b4afbe9140955b587457fef2c281c38defd8cde2c76c6f65b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-af54-4fd5-8f44-4755950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'c0296ba94b4445a4e3be227a31d3ccba011ebb358e93224a5141f53e9f6ec832']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4cdc-4c75-85a4-4819950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'c068b9246a31d99b810b253b7e92695108bcf27d253de4e4ac0aed3ab02e83ab']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-fb30-41c1-917c-499f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'c097751002442abbcb8c85e5df07d64fae35c03789a4dfe364ffd3b5496891b4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9ca0-458f-8aab-466e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'c0e4aa6f57baae774b036bb5f9e9dd70a069d5ef03164c4b5e2a5825846b365e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-46a8-4640-9263-4e1a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'c1c6df93b8a8be0778e11214954017d9bf9971e30bef80a4c2031aadb2c63e3b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-eebc-4b0a-9342-4791950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'c273a69f39e66cf687f1d9089e7c21191f265c34c0dded99cefea57df8509c24']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8f64-4c18-8a30-4c7e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'c39babff09e33d20d0d24c0ff68810aa593a22fd53f5da287991a7373446a8da']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-3a34-4048-a73a-4f60950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'c4313ab89c3d94ab70185df327c664379490b263d47057543a5d7ab40e2ee588']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-ddfc-4991-a1da-4137950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ca9d11fb8b3919443e066d8e91587c34191c3b273a0f884c48084df77263de55']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6d74-4b8f-a4cc-4c1f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'caec6bb70c5c1ba33b2c0981e39b335177b3a31d9fedfd23e4c8194abdb3d6f1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f0d0-44aa-8e51-4dc5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'cc3ceb50174349d9346cee8c330b9d172c8260a7a98d38de34c5322cce53c31b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6874-487d-b518-4dcb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'cce6c0a11c9c10efbe0b7b6f5d8ca6150886188dc748c1d372358bd4e62cc720']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0dcc-4a16-9418-4aa8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'cdd034e8c27dcaf9baad53fa038b5931f2aeb4f313980fd99b5eb7d615df3458']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-a514-4ef9-b6e6-42e5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ce53701bddcc24071c55b2b02c79508276b3c69444275f994c0fe690c63b8df8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7d34-4276-9a9e-4def950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'cecc04094781c3d8440f54999d5b69e4ab7f4f2a3a0d6e85878ca60c0cafa34c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b1e8-471f-b8e0-4e24950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'cee3b79780438aadc98ea5b4229b754566430516e2792cc7d048fc472c4dbc79']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-e638-4df9-8eb4-48b2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'cfd3c017a7e9a7a1a1e47a60bdbfde167899caae9da81e5854994a851d9927f4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0f98-442a-8de5-4910950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'cfde9188f77427c56c541fba1ff15249dbdf2baf3f466367ba72a5c9a70b0d80']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-412c-4af1-b8a0-4f85950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd00bdf9012c8e83fd4e7f6ddb9dee9167db6297151d48fd9ea660a6ae52239cc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6514-4125-a3b8-407e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd10f6ae7735ec1767efb756a14aa8f45d3d0b926787eb6e682ae85a4f2e5f5af']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-5440-4413-a621-44c2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd11b980ada1634b17462c05c4f2ade8894f2267b254038aa27fddbf2e2f4c850']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f934-4871-9673-4e93950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd1509de315be40dac5807a016fd4c843abda063012d29732720db7087bb73f1b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7d58-43f4-87a2-49c8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd156e14065b5293a5511a027e6943399b3450a6b3ff74c50e31b3b7f4a1153f1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-175c-4ad1-a528-4722950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd158c1111de1b21a41af1099e0718ecda240a42636a5456ce2074f3ee6f7ba9a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c164-400b-b5c6-4aec950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd1f29d6ffb069c12670a264bf12a7ad4fc1c159b7f6aa61c97cd90d44289eec3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6978-490a-b2a6-45f2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd2b3946be545c3da30e779f60e73db1796073d6ca5ebef49a7cea7a75169cabf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-13e4-4613-a8f3-476d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd3f79eb90bfeccb507f69989ed38e32fddd7108660c92313260a64c798fe0167']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c300-4296-8ac2-480f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd4e793361db4e58aaf534f93b57e4ae5e2e53583caebede11522cb757e29696c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6600-46b2-966a-43e4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd69a55c55cf4c831579defdc8ae640997141c577558adc07fe53d037008541e3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0a90-4d0c-8a92-404f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd7841ad990416b6c46e98331ca6ca133be96dd1c463407f1b0e4bc759b002cfa']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b434-4010-a94b-48b1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd8f73e616842ea745a15959c217dd383dd41cd0f706035759d40e5ea1ffdacce']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-56d0-4a93-a3a4-4ef7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd942f42f13aebdeff0f6d2ad02ba0d86d7ef7bfb070fec0e32e0aa8851032e9d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f0d4-4d5d-bebb-4b80950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'dc8c82e7dd88d9d42f2872fee149eb219b537c2f21035834bed17cd205f54a51']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8ccc-43bf-81b0-43d7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'dcf687e47e3ff38a34ab94cf0651e6a45a7d63ee4c7668bfbe3ebc375da3d7ba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-3418-4fef-ab5e-4221950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'dee5e465fc4959e019cc6e781d4be278997c34a0465fa36825339e12068119c5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d268-4960-8b2b-4f87950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e08f1f54620bafe44200b3e12177e6a934e2d27910125144aec9606b68d44a88']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-888c-4bb9-9a84-461f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e15200f16ce6d15b4405184bd6fb3889731ba3de306844f76913113e26146cf2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-28d0-41d8-98a2-4883950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e192c87072de321abd224a30c571207d986b882ec662da9c4ddf1b83d407eaa7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-db70-4309-9090-4ac3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e1b34078b5aab799cb78e7103286817a740da430fd1f107bfd4a673dce8fa9fc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-7768-4b41-a8cc-41b0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e31f26fbb1265cef7403c4204fe2d47cf27617a6f9e166b2416cbffdafe34a28']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1810-43d7-8640-4256950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e43c2070435f9aa704408a6e4f9112b2e83288039bf8382023c3973956c670ac']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c664-42d9-af12-4914950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e4d735594547dc26fbb13846676cdaf387120da23756b4d5ae563da8a7609f3a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-70d0-4408-b5aa-4938950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e7d93e7f5cf85d8daa275fe73346930fe70233d553bd1d509cb7c2008abd3c7e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1c68-493e-b802-4674950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e985205932309edce7ea1130d1a3ba169a8b9b5a84c890e01633e45aa7b76e0e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c0f8-4ad3-94a3-4b01950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e9c24d0a80b622749a1b30f9d384a7cdd844310dbd3054898ec322cfabb65280']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-5f48-4635-84c3-441f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e9f64d3adddf546b49d2281519c8ada60cfbb3abd6b66a6ba25992cd6627ad26']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-fd98-462d-9fb7-4170950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e9fe7ebd22877358cc0f02c233faeaf4c40cf057a3c9fe5ba0a53ff3d9765f4b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-9418-4e6b-aa63-4205950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'eafc44e91530127b5ac46763dc14015963b77c2c52846ec7da42c50ecbaabb54']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-1e7c-4378-95ad-4274950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ebed0b54c50962470c7e541ea3874b6ccf71812540edff4a06080f978900d840']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b3d0-4bc4-974e-43d2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ebf4d1f9396d6ab1aff5b3cc6c8e682e1291c49bbbe51ac5c797dc252833909f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-f5f0-4a5b-a25e-4604950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ebf4d1f9396d6ab1aff5b3cc6c8e682e1291c49bbbe51ac5c797dc252833909f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4280-4041-9376-4768950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ec58ed473d3c8fc3d6f4430930359436771de9291d58b30d67b333ef01d59dba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-de14-4e64-b677-4d97950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ec58ed473d3c8fc3d6f4430930359436771de9291d58b30d67b333ef01d59dba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-ca8c-45b9-905d-4975950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ecb914fcb7ac970616768bf7ec7c8fdb27512fe0d1ae00980e6070b1226d95bb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-67b0-49a0-8b59-40c0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ecb914fcb7ac970616768bf7ec7c8fdb27512fe0d1ae00980e6070b1226d95bb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-561c-4125-9cbc-48cc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ecfeced9d622807d2b82b64fc2ba725603f9116f41e1ddb58715e1f751bbebb9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-ec9c-47ae-ae64-48c5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ecfeced9d622807d2b82b64fc2ba725603f9116f41e1ddb58715e1f751bbebb9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d464-413b-9828-498d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ed16e269224b7daeb5fb8aa5194543c3b300d5e9e916f1c00e268747c676247c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-6f94-4af2-83ef-4778950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ed16e269224b7daeb5fb8aa5194543c3b300d5e9e916f1c00e268747c676247c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4ec4-41e6-9474-4103950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ed43f1d983feb172fcf4b62956428ab6b4410a4cddbc6f02657f00dce2fc3a1c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-f41c-4f5a-9e3f-4e78950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ed43f1d983feb172fcf4b62956428ab6b4410a4cddbc6f02657f00dce2fc3a1c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-eb20-4a0d-ae3f-4aa9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ed99eea02491a4c659a54cb39f368b7c4713cbc6ef9677f169c1cb09f533bd6d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-8010-4aaf-a177-4864950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ed99eea02491a4c659a54cb39f368b7c4713cbc6ef9677f169c1cb09f533bd6d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-6e18-4a1c-8398-4db8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'eeb435abd819f5ec850aba835f52125beba9d45e3d86ac0000eafc27f9844dc8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-04fc-4910-9db4-415e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'eeb435abd819f5ec850aba835f52125beba9d45e3d86ac0000eafc27f9844dc8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-0114-47b8-a84f-468a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'eecfcd71ce7ec89f8d1b642c80106db2ccae5721bf88148031ce077a93172068']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-985c-4521-8f56-442f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'eecfcd71ce7ec89f8d1b642c80106db2ccae5721bf88148031ce077a93172068']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b030-482d-a75c-469b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f010103d51638b98c985abdab4fe9deaeb850bf924f93b53c9084da8ce927f5b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-3cec-477e-b08d-4aae950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f010103d51638b98c985abdab4fe9deaeb850bf924f93b53c9084da8ce927f5b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-5394-46f3-9a7e-4c75950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f03677848e924269e0c8f357ad56e96fb7d0875b6aef434779594e5fbeacb2aa']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-c2a0-41dd-bd3a-43c5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f03677848e924269e0c8f357ad56e96fb7d0875b6aef434779594e5fbeacb2aa']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-f824-498f-91b0-4974950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f0b78cf8d5df4c9873ecd7750eb6b49d565097ca59e8592b07a2e748fda1ab2d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-5344-4075-a623-4de1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f0b78cf8d5df4c9873ecd7750eb6b49d565097ca59e8592b07a2e748fda1ab2d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-8cb0-4863-9f15-4b24950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f11b7237907275ca59ce4f0b630f69a6c3770b0060359917bf465690e2309e47']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-e064-43a6-929e-4be9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f11b7237907275ca59ce4f0b630f69a6c3770b0060359917bf465690e2309e47']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2d58-44ea-98f4-4919950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f23d4daa59e771990a4ed13100d5a39454c89e3c01ccfb6bfa9b3257dcd51b13']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-6ac8-4920-83a5-406e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f23d4daa59e771990a4ed13100d5a39454c89e3c01ccfb6bfa9b3257dcd51b13']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-c9b4-436b-b862-4387950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f2e0902e21abde220813e7a4ea68c7b6039e92cecf338a522739e0d03bbbca16']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-eeec-4109-9ab8-41e8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f2e0902e21abde220813e7a4ea68c7b6039e92cecf338a522739e0d03bbbca16']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-3348-4924-8d98-4450950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f323778fbfaca654f6b91124c60d81bc3fba360ff96d30f0253293760ae504a0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-5d30-46db-a952-4e87950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f323778fbfaca654f6b91124c60d81bc3fba360ff96d30f0253293760ae504a0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-ac7c-46d9-9a2f-49de950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f47750218afdebc37ae9462356dd5a1209a238e4228dd10001641211b91862ac']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-de98-4e28-b9da-45de950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f47750218afdebc37ae9462356dd5a1209a238e4228dd10001641211b91862ac']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2e48-4582-8c25-4643950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f4b997725f499272c992b611b85db6b23f5b147319c0db0f093550178cbc1a17']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-50c4-4315-bbf0-46d3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f4b997725f499272c992b611b85db6b23f5b147319c0db0f093550178cbc1a17']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b26c-482c-b3ff-4648950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f584ec598c2926ecd0ee48c84a0a4e6d780de993281f390f6f93f014649fd2f2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-dde4-4cca-97c2-4bd9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f584ec598c2926ecd0ee48c84a0a4e6d780de993281f390f6f93f014649fd2f2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-2b3c-4cf7-8610-4600950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f6546f3a9fb403743f9ab72ed5c8e9cc63f26bc65f4fbd7139e4adbb12e854b8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-4c28-41da-a411-4b3d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f6546f3a9fb403743f9ab72ed5c8e9cc63f26bc65f4fbd7139e4adbb12e854b8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-b604-4467-8f7f-4935950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f703df08f5e7388f4873137977cf1c96a24293a7bf93b952c586c27b34e4212e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-e884-474d-aad9-4c71950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f703df08f5e7388f4873137977cf1c96a24293a7bf93b952c586c27b34e4212e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-4324-4a47-a067-4d4b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f7854d717ea3449b6cf2ed56b8fc1e790dff23df19c62e554f233300faac8750']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-77fc-431f-8d88-4d1b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f7854d717ea3449b6cf2ed56b8fc1e790dff23df19c62e554f233300faac8750']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-ceb4-47c8-b501-4927950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f7dd9c3111f0e0ed831ecf858f98a95389818378526a5c69e0cfea1977638d0a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-04b8-4708-861a-4a77950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f7dd9c3111f0e0ed831ecf858f98a95389818378526a5c69e0cfea1977638d0a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-53a0-43b7-b282-4456950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f82333a95a38167b554da0a6d2da54b19a0c633e6d8aa3a3a47c98a3fee304ab']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-91d8-41ea-942f-48e0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f82333a95a38167b554da0a6d2da54b19a0c633e6d8aa3a3a47c98a3fee304ab']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6ea-d184-4edc-bc54-427e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f85cdff7982cdd06bfd1deea928678ebc6d83625a2f5090f094153312e914849']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-10e8-4ace-b02c-4cda950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f85cdff7982cdd06bfd1deea928678ebc6d83625a2f5090f094153312e914849']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-7a20-4dc1-ad0c-40f7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f8af90b820a1e6b052ce62d9f8446457f74a4542c6d6f6eec354b895982502b1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-8314-46ee-96be-4760950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f8af90b820a1e6b052ce62d9f8446457f74a4542c6d6f6eec354b895982502b1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-f930-403c-a562-4d54950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:58.000Z", "modified": "2018-03-13T11:32:58.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f974b1b74f862028f1335b15ed98d1388cdc770b6770aac9b7cc62847d9dad32']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-0864-4818-8f52-4e56950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f974b1b74f862028f1335b15ed98d1388cdc770b6770aac9b7cc62847d9dad32']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-73f4-404b-86ed-4053950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f97576b901e8daaac28370cbbc31ed48b98cea84b64a7d83c1fc2c805bf0c672']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-9584-450f-b687-4ba9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'f97576b901e8daaac28370cbbc31ed48b98cea84b64a7d83c1fc2c805bf0c672']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-f2a0-4594-acf7-43ba950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'fa9beaf7e8eb887f46ed584d2bb5b79f3c0fe5d57d6a5aecbdc7f6093c316eb8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-281c-4ddf-961a-4e9d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'fa9beaf7e8eb887f46ed584d2bb5b79f3c0fe5d57d6a5aecbdc7f6093c316eb8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-8218-427b-8733-486c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'fb74870bd4441e5933712c79804c3d9aeb0ba86162295990183abe8daa235c3d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-b604-43a1-ac6c-4e2a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'fb74870bd4441e5933712c79804c3d9aeb0ba86162295990183abe8daa235c3d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-1ce4-434a-849e-4b31950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'fc88d645f9885abf4274e7ed18e555447da13ef2c88082fdf904c3b869ab2854']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-4770-4213-80a4-45d2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'fc88d645f9885abf4274e7ed18e555447da13ef2c88082fdf904c3b869ab2854']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-ad88-42e9-ab32-4368950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'fe18a882867fd6725bc5c3afc0f8b7e9a81383d7c8baf30dec362c4eb2c95ccb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-b67c-44c4-8f6d-4a8f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'fe18a882867fd6725bc5c3afc0f8b7e9a81383d7c8baf30dec362c4eb2c95ccb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-46c4-4d3b-b79a-48d5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'fee25e7d024107c867f4ddbb61756bb02e935a8802813f5d8677b3ecc282759d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-2970-4f1e-befa-4e78950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'fee25e7d024107c867f4ddbb61756bb02e935a8802813f5d8677b3ecc282759d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-d5d8-4cc7-bd8b-4c05950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-bec4-497d-96e8-451e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-5f10-439a-990a-4f6f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ff9785c05c08789800db47812c4e70ab892ecdba07189aa38fe0edbc4b87837d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-4a54-455d-bc42-47a4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ff9785c05c08789800db47812c4e70ab892ecdba07189aa38fe0edbc4b87837d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-c070-4c66-9d39-4b7b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ffd17e07e3b64207128b0b10f7b638c8bc97022f07b4410e7de28ad07650db09']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-e3f4-4320-9b52-4105950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'ffd17e07e3b64207128b0b10f7b638c8bc97022f07b4410e7de28ad07650db09']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-7c68-4f52-8c34-4baa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '423d6adbb47ce64e47944fe07bd22fd1a06e2332f5975b0da329394dcd7a5d3a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-33c8-4424-8c0a-4f3d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = '423d6adbb47ce64e47944fe07bd22fd1a06e2332f5975b0da329394dcd7a5d3a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-22ec-4f31-810e-4460950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a85ec8d623a497bd37efe216f8bd9e88ad24050949aacaf66461165ba09d5861']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-c534-41f8-b815-4331950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'a85ec8d623a497bd37efe216f8bd9e88ad24050949aacaf66461165ba09d5861']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-437c-48d7-8768-49b8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd5d0afc9b0697ddbf097e4704c0e4818b09a3f195b88f276b57f3e665352d7c9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-c13c-4e64-aa23-4682950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'd5d0afc9b0697ddbf097e4704c0e4818b09a3f195b88f276b57f3e665352d7c9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b759-5dfc-4d9b-936e-4bd3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:34:49.000Z", "modified": "2018-03-13T11:34:49.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e112816a6380c8dd1c242ff911c2e59331615443fec86f5125e51ab10db1ad43']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b6eb-c3b8-4fd7-8a37-45ee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:32:59.000Z", "modified": "2018-03-13T11:32:59.000Z", "description": "Malicious Document", "pattern": "[file:hashes.SHA256 = 'e112816a6380c8dd1c242ff911c2e59331615443fec86f5125e51ab10db1ad43']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-58b8-4baa-bf9a-4633950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:19.000Z", "modified": "2018-03-13T13:32:19.000Z", "pattern": "[domain-name:value = '22ll.ru']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-5270-4f42-8018-403f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:19.000Z", "modified": "2018-03-13T13:32:19.000Z", "pattern": "[domain-name:value = '22yy.ru']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-d2ac-4b6f-8a39-4ed4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:20.000Z", "modified": "2018-03-13T13:32:20.000Z", "pattern": "[domain-name:value = '2weqntuqwenwqeua.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-4ca8-482c-8b68-410a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:20.000Z", "modified": "2018-03-13T13:32:20.000Z", "pattern": "[domain-name:value = 'aandeegnaeany.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-e51c-4966-87f1-47b6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:21.000Z", "modified": "2018-03-13T13:32:21.000Z", "pattern": "[domain-name:value = 'aarisingyoulimitedbehalf.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-6170-4d46-a4fd-4fae950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:21.000Z", "modified": "2018-03-13T13:32:21.000Z", "pattern": "[domain-name:value = 'acquisitorv.megabulkmessage206.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-dd60-441a-b64a-4736950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:21.000Z", "modified": "2018-03-13T13:32:21.000Z", "pattern": "[domain-name:value = 'addendumtheshall.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-4e60-4edc-a3bc-44c9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:22.000Z", "modified": "2018-03-13T13:32:22.000Z", "pattern": "[domain-name:value = 'addrestartfokss.cc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-c2e4-4c81-95a9-492d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:22.000Z", "modified": "2018-03-13T13:32:22.000Z", "pattern": "[domain-name:value = 'adistributedmean.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-5450-40f2-ae74-4320950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:22.000Z", "modified": "2018-03-13T13:32:22.000Z", "pattern": "[domain-name:value = 'adojqnwdiqzxcqwdqwn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-bb8c-4c29-89df-49f2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:23.000Z", "modified": "2018-03-13T13:32:23.000Z", "pattern": "[domain-name:value = 'afollincidincludesder.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-2264-4db3-ae6e-44bc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:23.000Z", "modified": "2018-03-13T13:32:23.000Z", "pattern": "[domain-name:value = 'afterattackp.garrashe.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8554-40c8-8af2-4bb0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:24.000Z", "modified": "2018-03-13T13:32:24.000Z", "pattern": "[domain-name:value = 'aiwdmduawdnjz.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-3538-4b67-bbf6-464f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:24.000Z", "modified": "2018-03-13T13:32:24.000Z", "pattern": "[domain-name:value = 'aiwjawnzjznawenes.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-58bc-455f-ae78-4f58950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:24.000Z", "modified": "2018-03-13T13:32:24.000Z", "pattern": "[domain-name:value = 'akeansynyaweomasny.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-3b68-4311-80f6-4971950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:25.000Z", "modified": "2018-03-13T13:32:25.000Z", "pattern": "[domain-name:value = 'akgheioahvnh.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-a7b8-46a2-ab13-4613950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:25.000Z", "modified": "2018-03-13T13:32:25.000Z", "pattern": "[domain-name:value = 'allconseqprojectincl.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-1b10-4f66-b76e-4fb5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:26.000Z", "modified": "2018-03-13T13:32:26.000Z", "pattern": "[domain-name:value = 'amnsiegkeaas.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8440-48a7-b027-4f93950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:26.000Z", "modified": "2018-03-13T13:32:26.000Z", "pattern": "[domain-name:value = 'amphibietyn.megabulkmessage226.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-fcac-473c-95aa-4bed950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:26.000Z", "modified": "2018-03-13T13:32:26.000Z", "pattern": "[domain-name:value = 'anaphaset.megabulkmessage219.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-6af0-401b-acec-40c7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:27.000Z", "modified": "2018-03-13T13:32:27.000Z", "pattern": "[domain-name:value = 'andfeatandlistusedpacthe.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-cd18-4755-a2da-44f1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:27.000Z", "modified": "2018-03-13T13:32:27.000Z", "pattern": "[domain-name:value = 'andigermaster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-3328-48ff-8d7b-4b96950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:27.000Z", "modified": "2018-03-13T13:32:27.000Z", "pattern": "[domain-name:value = 'andninformationfrom.ru']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-a3c4-4c09-b296-4735950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:28.000Z", "modified": "2018-03-13T13:32:28.000Z", "pattern": "[domain-name:value = 'andnmayphpsoftware.ru']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-09d4-4972-8b33-48d8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:28.000Z", "modified": "2018-03-13T13:32:28.000Z", "pattern": "[domain-name:value = 'aniymansngihynenrne.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-6d28-4331-a467-4e47950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:29.000Z", "modified": "2018-03-13T13:32:29.000Z", "pattern": "[domain-name:value = 'ansdijiqwiewc.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-49f8-498a-b20b-4404950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:29.000Z", "modified": "2018-03-13T13:32:29.000Z", "pattern": "[domain-name:value = 'anymonbunrybgakbweew.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-e43c-4dce-8721-4622950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:29.000Z", "modified": "2018-03-13T13:32:29.000Z", "pattern": "[domain-name:value = 'anytreeggnasneefor.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-7ee4-4f4c-82f7-41c6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:30.000Z", "modified": "2018-03-13T13:32:30.000Z", "pattern": "[domain-name:value = 'aobjcondigrantedfithe.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-adbc-489b-8565-4bfc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:30.000Z", "modified": "2018-03-13T13:32:30.000Z", "pattern": "[domain-name:value = 'aodkqiwjdqwezxcmasdqynu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-31e0-4418-85bd-4c3d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:30.000Z", "modified": "2018-03-13T13:32:30.000Z", "pattern": "[domain-name:value = 'aodwpzkgnbynvynr.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-ae34-49da-a051-433a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:31.000Z", "modified": "2018-03-13T13:32:31.000Z", "pattern": "[domain-name:value = 'apalicenseapachethisthe.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-4f40-4d27-adaf-4f56950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:31.000Z", "modified": "2018-03-13T13:32:31.000Z", "pattern": "[domain-name:value = 'apjbqjasdqeeee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-cacc-4f4a-865d-40b2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:32.000Z", "modified": "2018-03-13T13:32:32.000Z", "pattern": "[domain-name:value = 'aposdnbyenvgeb.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-50e4-4530-a16b-486a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:32.000Z", "modified": "2018-03-13T13:32:32.000Z", "pattern": "[domain-name:value = 'aristocrato.white-messages-242.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-da80-4f4e-83bd-4450950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:32.000Z", "modified": "2018-03-13T13:32:32.000Z", "pattern": "[domain-name:value = 'armmasnmcznxqieqqty.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-6d18-4945-9013-49c4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:33.000Z", "modified": "2018-03-13T13:32:33.000Z", "pattern": "[domain-name:value = 'arnitorolgieetoneshutki.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-d648-49a1-a1b7-42e6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:33.000Z", "modified": "2018-03-13T13:32:33.000Z", "pattern": "[domain-name:value = 'arniytreegoogofastii.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-3230-4c30-aaea-419a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:34.000Z", "modified": "2018-03-13T13:32:34.000Z", "pattern": "[domain-name:value = 'asdljnoqwdnoqwdqwqwwqe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-9cf0-4d70-881c-4a90950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:34.000Z", "modified": "2018-03-13T13:32:34.000Z", "pattern": "[domain-name:value = 'augitesc.meet-girls.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-f748-4af9-bbb7-49e7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:34.000Z", "modified": "2018-03-13T13:32:34.000Z", "pattern": "[domain-name:value = 'autogamiess.bulkmessage-234.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-739c-4dee-a39a-4aa1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:35.000Z", "modified": "2018-03-13T13:32:35.000Z", "pattern": "[domain-name:value = 'awekzhktmwqqwe.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-d8e4-43d4-b67f-4995950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:35.000Z", "modified": "2018-03-13T13:32:35.000Z", "pattern": "[domain-name:value = 'basisdirectconditionswo.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-52e0-4863-b0e9-4fe2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:35.000Z", "modified": "2018-03-13T13:32:35.000Z", "pattern": "[domain-name:value = 'bccxgddsiugjj.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-d768-4630-8e6d-4309950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:36.000Z", "modified": "2018-03-13T13:32:36.000Z", "pattern": "[domain-name:value = 'bemurmurn.meetlocals69.webcam']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-58d0-4e30-9b69-45a9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:36.000Z", "modified": "2018-03-13T13:32:36.000Z", "pattern": "[domain-name:value = 'benzoperoxidet.megabulkmessage232.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-bc88-4239-8b95-46b8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:37.000Z", "modified": "2018-03-13T13:32:37.000Z", "pattern": "[domain-name:value = 'bhembuvrkvhngg.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-27ac-43d4-9bfa-4316950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:37.000Z", "modified": "2018-03-13T13:32:37.000Z", "pattern": "[domain-name:value = 'bithedistributedlicense.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-7e80-4045-9459-404c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:37.000Z", "modified": "2018-03-13T13:32:37.000Z", "pattern": "[domain-name:value = 'blog.cvvshop.lv']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-d234-4bdb-9865-4f92950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:38.000Z", "modified": "2018-03-13T13:32:38.000Z", "pattern": "[domain-name:value = 'bnvmghfjdhrg.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-23f4-4227-a935-4bc2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:38.000Z", "modified": "2018-03-13T13:32:38.000Z", "pattern": "[domain-name:value = 'brontephobian.message-services-237.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8a04-4753-a29e-42fd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:39.000Z", "modified": "2018-03-13T13:32:39.000Z", "pattern": "[domain-name:value = 'calamodendronm.message-services-222.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-e970-495a-85cc-407e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:39.000Z", "modified": "2018-03-13T13:32:39.000Z", "pattern": "[domain-name:value = 'cancrume.message-services-240.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-4878-4cf4-b991-42df950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:39.000Z", "modified": "2018-03-13T13:32:39.000Z", "pattern": "[domain-name:value = 'caneventopensslthistheu.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-ac30-4cdf-968b-4bfd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:40.000Z", "modified": "2018-03-13T13:32:40.000Z", "pattern": "[domain-name:value = 'cbxndhsjeuwas.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-28e8-4fbc-ae5c-4c3f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:40.000Z", "modified": "2018-03-13T13:32:40.000Z", "pattern": "[domain-name:value = 'cdn.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-b0f4-4f6a-a583-47e9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:40.000Z", "modified": "2018-03-13T13:32:40.000Z", "pattern": "[domain-name:value = 'chazzenimc.megabulkmessage226.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-6bc8-413b-99b0-4779950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:41.000Z", "modified": "2018-03-13T13:32:41.000Z", "pattern": "[domain-name:value = 'choctawk.karmalsio.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-0888-4b8c-aa72-4235950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:41.000Z", "modified": "2018-03-13T13:32:41.000Z", "pattern": "[domain-name:value = 'churchmastert.googleboobs42.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-9224-45ca-9d2c-462b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:42.000Z", "modified": "2018-03-13T13:32:42.000Z", "pattern": "[domain-name:value = 'coniferf.message-services-232.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-1648-418f-9a9a-4d58950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:42.000Z", "modified": "2018-03-13T13:32:42.000Z", "pattern": "[domain-name:value = 'conseqcodepackage.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-9b34-422e-b7fe-4b62950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:42.000Z", "modified": "2018-03-13T13:32:42.000Z", "pattern": "[domain-name:value = 'continuatorh.googleboobs44.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-19e0-40e1-9213-4157950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:43.000Z", "modified": "2018-03-13T13:32:43.000Z", "pattern": "[domain-name:value = 'contributionsthroughy.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-639c-4300-bb85-4de6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:43.000Z", "modified": "2018-03-13T13:32:43.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.19.130.150']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-a5d4-4a9c-ba00-4e67950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:43.000Z", "modified": "2018-03-13T13:32:43.000Z", "pattern": "[domain-name:value = 'contributorblists.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0cdc-45e4-930d-431a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:44.000Z", "modified": "2018-03-13T13:32:44.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.244.248.94']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-33bc-49fe-bffd-42a0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:44.000Z", "modified": "2018-03-13T13:32:44.000Z", "pattern": "[domain-name:value = 'contsoftseeimpthpro.ru']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8480-43f7-be90-4c66950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:45.000Z", "modified": "2018-03-13T13:32:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.5.125.204']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-bcf4-48c6-87df-4d88950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:45.000Z", "modified": "2018-03-13T13:32:45.000Z", "pattern": "[domain-name:value = 'cothenahudson.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f008-41c4-b61e-4040950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:45.000Z", "modified": "2018-03-13T13:32:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '105.159.251.209']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-4438-4fa5-8551-4682950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:46.000Z", "modified": "2018-03-13T13:32:46.000Z", "pattern": "[domain-name:value = 'cotylophorousi.bestmessage-service83.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4e48-4efe-a46d-4e42950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:46.000Z", "modified": "2018-03-13T13:32:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.102.5.159']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-db1c-431d-8932-4b44950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:47.000Z", "modified": "2018-03-13T13:32:47.000Z", "pattern": "[domain-name:value = 'crestfallennessx.white-messages-233.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8588-4e27-95a3-4e4f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:47.000Z", "modified": "2018-03-13T13:32:47.000Z", "pattern": "[domain-name:value = 'cryptsoftdataconliaco.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a9cc-4682-9451-4cc8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:47.000Z", "modified": "2018-03-13T13:32:47.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.107.91.52']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-06f0-4255-ae08-45f8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:48.000Z", "modified": "2018-03-13T13:32:48.000Z", "pattern": "[domain-name:value = 'csh0p.ru']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1b30-48a3-86bd-42d0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:48.000Z", "modified": "2018-03-13T13:32:48.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.120.214.195']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-6e2c-477f-ac93-46d5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:49.000Z", "modified": "2018-03-13T13:32:49.000Z", "pattern": "[domain-name:value = 'cvvshop.lv']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7844-49cc-ab9f-4203950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:49.000Z", "modified": "2018-03-13T13:32:49.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.120.246.101']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-e120-4816-b6b5-483b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:49.000Z", "modified": "2018-03-13T13:32:49.000Z", "pattern": "[domain-name:value = 'cysticarpicp.bulkmessage-226.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5ce4-4078-850e-4225950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:50.000Z", "modified": "2018-03-13T13:32:50.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.121.206.4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-5158-4c23-8fe2-4ddc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:50.000Z", "modified": "2018-03-13T13:32:50.000Z", "pattern": "[domain-name:value = 'cytotropisml.megabulkmessage243.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b2f0-4f95-a7c0-4aaf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:51.000Z", "modified": "2018-03-13T13:32:51.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.121.214.139']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-cc80-462c-a089-4e96950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:51.000Z", "modified": "2018-03-13T13:32:51.000Z", "pattern": "[domain-name:value = 'decennarya.message-services-237.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b860-491e-814d-4cf9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:51.000Z", "modified": "2018-03-13T13:32:51.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.121.223.150']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-480c-401e-bab4-492d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:52.000Z", "modified": "2018-03-13T13:32:52.000Z", "pattern": "[domain-name:value = 'deformetere.francegirls.club']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ca50-4462-a13e-4ec7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:52.000Z", "modified": "2018-03-13T13:32:52.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.160.28.196']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-c398-4685-af97-42ab950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:52.000Z", "modified": "2018-03-13T13:32:52.000Z", "pattern": "[domain-name:value = 'deliberatelyr.megabulkmessage246.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ef64-41fd-b7c6-450a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:53.000Z", "modified": "2018-03-13T13:32:53.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.166.208.203']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-61e8-4981-8e0f-4430950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:53.000Z", "modified": "2018-03-13T13:32:53.000Z", "pattern": "[domain-name:value = 'deresinizez.message-services-226.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-06cc-4f04-be98-4292950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:54.000Z", "modified": "2018-03-13T13:32:54.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.166.237.170']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-bb78-4bf9-982b-45ca950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:54.000Z", "modified": "2018-03-13T13:32:54.000Z", "pattern": "[domain-name:value = 'development.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-172c-4ef8-bf92-4526950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:54.000Z", "modified": "2018-03-13T13:32:54.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.172.179.12']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-35d8-4e74-9dd5-4034950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:55.000Z", "modified": "2018-03-13T13:32:55.000Z", "pattern": "[domain-name:value = 'devqa.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-020c-4fe6-8db1-4da1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:55.000Z", "modified": "2018-03-13T13:32:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.172.255.73']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-a098-4f95-8672-483c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:56.000Z", "modified": "2018-03-13T13:32:56.000Z", "pattern": "[domain-name:value = 'dfhuytklop.name']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-03f8-4688-b729-4853950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:56.000Z", "modified": "2018-03-13T13:32:56.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.175.6.103']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-2200-4092-bac0-4ee7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:56.000Z", "modified": "2018-03-13T13:32:56.000Z", "pattern": "[domain-name:value = 'dianoeticb.meet-girls.club']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-fbbc-4c6c-9e36-4b73950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:57.000Z", "modified": "2018-03-13T13:32:57.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.224.31.205']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-b178-4906-a02a-4de7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:57.000Z", "modified": "2018-03-13T13:32:57.000Z", "pattern": "[domain-name:value = 'disunitesq.meet-girls.club']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2f44-413a-8bb2-4d29950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:58.000Z", "modified": "2018-03-13T13:32:58.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.237.41.199']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-fe88-4bf6-a95b-43ea950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:58.000Z", "modified": "2018-03-13T13:32:58.000Z", "pattern": "[domain-name:value = 'diuhqioduqwdioqdhuqwd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9b70-4642-849d-4205950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:58.000Z", "modified": "2018-03-13T13:32:58.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.239.19.36']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-56ec-4367-bcb7-44ef950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:59.000Z", "modified": "2018-03-13T13:32:59.000Z", "pattern": "[domain-name:value = 'dkkdjslla.info']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ac98-4179-ad53-4283950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:59.000Z", "modified": "2018-03-13T13:32:59.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.239.19.74']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-dd68-464f-b1bc-4cf0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:32:59.000Z", "modified": "2018-03-13T13:32:59.000Z", "pattern": "[domain-name:value = 'dlbhbifjnseaavc.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:32:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bbcc-47a9-9948-4ef5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:00.000Z", "modified": "2018-03-13T13:33:00.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.75.47.229']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-550c-410e-91a1-4b7d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:00.000Z", "modified": "2018-03-13T13:33:00.000Z", "pattern": "[domain-name:value = 'doawndazzzzw.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-da3c-4b77-b4be-4726950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:01.000Z", "modified": "2018-03-13T13:33:01.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.96.148.33']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-f35c-44c9-a88e-4b9a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:01.000Z", "modified": "2018-03-13T13:33:01.000Z", "pattern": "[domain-name:value = 'doijqfqnhweqwepapaos.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0dc4-4a25-9c28-4d32950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:01.000Z", "modified": "2018-03-13T13:33:01.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.96.248.32']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-5a98-4a79-b99d-4ff5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:02.000Z", "modified": "2018-03-13T13:33:02.000Z", "pattern": "[domain-name:value = 'dollarsv.meet-girls.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2e28-4875-b206-4cff950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:02.000Z", "modified": "2018-03-13T13:33:02.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '118.179.46.6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-a938-4085-bdf3-41c5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:03.000Z", "modified": "2018-03-13T13:33:03.000Z", "pattern": "[domain-name:value = 'dopaoxidasee.mailer-service205.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-3e24-4d46-8ca7-47f9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:03.000Z", "modified": "2018-03-13T13:33:03.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '124.248.191.64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6fb8-43dc-928b-4988950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:03.000Z", "modified": "2018-03-13T13:33:03.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '128.140.229.203']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-1cf4-47b7-a561-44c7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:04.000Z", "modified": "2018-03-13T13:33:04.000Z", "pattern": "[domain-name:value = 'doqknedornadayqwey.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7208-442a-b8db-4055950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:04.000Z", "modified": "2018-03-13T13:33:04.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '129.208.126.241']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8cc8-4d55-8f93-4786950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:05.000Z", "modified": "2018-03-13T13:33:05.000Z", "pattern": "[domain-name:value = 'dqiwdiyqbwdqwdquwd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6e7c-4bfb-a832-4c89950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:05.000Z", "modified": "2018-03-13T13:33:05.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '130.204.159.32']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-05fc-44c2-a57e-42f8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:05.000Z", "modified": "2018-03-13T13:33:05.000Z", "pattern": "[domain-name:value = 'drunkennessess.message-services-204.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7004-4dbc-bd4d-4256950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:06.000Z", "modified": "2018-03-13T13:33:06.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '130.204.182.230']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-7cd8-4c06-ba05-43cd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:06.000Z", "modified": "2018-03-13T13:33:06.000Z", "pattern": "[domain-name:value = 'ebanatibliatskazalebatvas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8190-4a84-a4a7-4ea8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:06.000Z", "modified": "2018-03-13T13:33:06.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '130.204.21.137']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-f670-4829-b7e1-4681950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:07.000Z", "modified": "2018-03-13T13:33:07.000Z", "pattern": "[domain-name:value = 'economisme.message-services-231.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8f98-478a-9c90-4284950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:07.000Z", "modified": "2018-03-13T13:33:07.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '130.204.234.81']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8070-4a44-8dff-43b9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:08.000Z", "modified": "2018-03-13T13:33:08.000Z", "pattern": "[domain-name:value = 'eitherlicwocommuniencl.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-aa20-4bcb-bb76-470f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:08.000Z", "modified": "2018-03-13T13:33:08.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '143.208.165.42']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-0368-46dd-b7c9-4f9b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:08.000Z", "modified": "2018-03-13T13:33:08.000Z", "pattern": "[domain-name:value = 'eoureottuekhsdew.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b3dc-4871-8e24-468d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:09.000Z", "modified": "2018-03-13T13:33:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.237.138.38']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8ca0-4826-9841-4afe950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:09.000Z", "modified": "2018-03-13T13:33:09.000Z", "pattern": "[domain-name:value = 'feathertopx.francegirls.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c374-435f-ad18-48cd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:10.000Z", "modified": "2018-03-13T13:33:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.237.80.80']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-118c-4001-8ec1-4717950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:10.000Z", "modified": "2018-03-13T13:33:10.000Z", "pattern": "[domain-name:value = 'fidicinall.megabulkmessage242.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c5c4-459c-ac3a-4a1c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:10.000Z", "modified": "2018-03-13T13:33:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.237.82.2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8d7c-472a-ac34-45bd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:11.000Z", "modified": "2018-03-13T13:33:11.000Z", "pattern": "[domain-name:value = 'fitnesstortliable.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d048-4a75-b588-4f1f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:11.000Z", "modified": "2018-03-13T13:33:11.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.251.23.210']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-0afc-408d-a749-45ce950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:12.000Z", "modified": "2018-03-13T13:33:12.000Z", "pattern": "[domain-name:value = 'flotsamc.bulkmessage-205.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c8d4-45e6-a957-4d2b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:12.000Z", "modified": "2018-03-13T13:33:12.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.252.202.94']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-936c-43c2-bd83-418f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:12.000Z", "modified": "2018-03-13T13:33:12.000Z", "pattern": "[domain-name:value = 'foradocumentcontr.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c228-45d9-a478-4eb8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:13.000Z", "modified": "2018-03-13T13:33:13.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '154.66.3.162']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-0a48-40bf-af86-4b40950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:13.000Z", "modified": "2018-03-13T13:33:13.000Z", "pattern": "[domain-name:value = 'formasnetoyvnastrchine.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c0f4-4c9f-a8a1-4880950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:14.000Z", "modified": "2018-03-13T13:33:14.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '155.133.93.30']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-51e0-4c96-a9ee-4b7e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:14.000Z", "modified": "2018-03-13T13:33:14.000Z", "pattern": "[domain-name:value = 'formasnirovanienahacb.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bca0-47c8-9580-4f07950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:14.000Z", "modified": "2018-03-13T13:33:14.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.202.176.148']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-afbc-4bcd-a09a-4563950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:15.000Z", "modified": "2018-03-13T13:33:15.000Z", "pattern": "[domain-name:value = 'fortrunernaskdneazxd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bfb8-4722-af5c-491f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:15.000Z", "modified": "2018-03-13T13:33:15.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.202.181.176']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-3958-4432-9495-4c03950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:15.000Z", "modified": "2018-03-13T13:33:15.000Z", "pattern": "[domain-name:value = 'forvardinganyyouwna.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d1a8-421c-95b0-4546950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:16.000Z", "modified": "2018-03-13T13:33:16.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.202.190.110']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ecf8-43bd-9d34-49d9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:16.000Z", "modified": "2018-03-13T13:33:16.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.223.180.238']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-ae40-414a-9f0c-45dc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:17.000Z", "modified": "2018-03-13T13:33:17.000Z", "pattern": "[domain-name:value = 'fqiwdkigjuiandasdasdj.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-2648-4894-9560-43d9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:17.000Z", "modified": "2018-03-13T13:33:17.000Z", "pattern": "[domain-name:value = 'ftp.qpweouplmmojdaiq.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f074-42ed-8604-4d07950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:17.000Z", "modified": "2018-03-13T13:33:17.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.153.15.117']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-87a8-448e-b259-403b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:18.000Z", "modified": "2018-03-13T13:33:18.000Z", "pattern": "[domain-name:value = 'fuckasbichsoseksnaset.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e2c0-42f1-89df-4e60950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:18.000Z", "modified": "2018-03-13T13:33:18.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.153.4.249']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-05f0-4c69-a145-437e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:19.000Z", "modified": "2018-03-13T13:33:19.000Z", "pattern": "[domain-name:value = 'gmumwmiwoqegwiwo.org']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e574-49fc-ad99-4371950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:19.000Z", "modified": "2018-03-13T13:33:19.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.169.197.24']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e7c4-4a98-bff4-4ac3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:19.000Z", "modified": "2018-03-13T13:33:19.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.169.216.126']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-7d94-488e-85f7-4f9c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:20.000Z", "modified": "2018-03-13T13:33:20.000Z", "pattern": "[domain-name:value = 'godetiaw.message-services-218.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-cb9c-457a-ae82-4447950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:20.000Z", "modified": "2018-03-13T13:33:20.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.169.217.56']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-f7f4-4c54-944f-4d5b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:20.000Z", "modified": "2018-03-13T13:33:20.000Z", "pattern": "[domain-name:value = 'gokokijsdjnxcpapdoasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-99f8-4c63-9665-4c18950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:21.000Z", "modified": "2018-03-13T13:33:21.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.237.74.213']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8fa0-4a1c-8ac3-46bc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:21.000Z", "modified": "2018-03-13T13:33:21.000Z", "pattern": "[domain-name:value = 'goloduha.info']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8988-43f5-8ba1-4eec950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:22.000Z", "modified": "2018-03-13T13:33:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.48.148.50']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-080c-4c8e-87f6-41ce950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:22.000Z", "modified": "2018-03-13T13:33:22.000Z", "pattern": "[domain-name:value = 'gorodkoff.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7d00-4d6e-bd1d-4353950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:22.000Z", "modified": "2018-03-13T13:33:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.48.180.1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-952c-4366-9231-467e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:23.000Z", "modified": "2018-03-13T13:33:23.000Z", "pattern": "[domain-name:value = 'hdclips111.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-84c8-4099-aec9-45b7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:23.000Z", "modified": "2018-03-13T13:33:23.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.48.52.161']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-22b0-4ff4-beb3-4f30950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:24.000Z", "modified": "2018-03-13T13:33:24.000Z", "pattern": "[domain-name:value = 'helpdesk.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7390-4528-9bdc-4e0f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:24.000Z", "modified": "2018-03-13T13:33:24.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.48.52.180']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-ad78-485a-8820-46bc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:24.000Z", "modified": "2018-03-13T13:33:24.000Z", "pattern": "[domain-name:value = 'homonymsv.megabulkmessage82.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6bb8-4cd0-b24b-4b66950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:25.000Z", "modified": "2018-03-13T13:33:25.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.130.130']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-5078-45c9-a666-4672950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:25.000Z", "modified": "2018-03-13T13:33:25.000Z", "pattern": "[domain-name:value = 'httpbusinessdirect.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6da4-4bfa-85c4-47c2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:25.000Z", "modified": "2018-03-13T13:33:25.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.157.99']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-cfec-4887-932c-447e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:26.000Z", "modified": "2018-03-13T13:33:26.000Z", "pattern": "[domain-name:value = 'hudsonenorincludes.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-76fc-44e4-a6f4-4052950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:26.000Z", "modified": "2018-03-13T13:33:26.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.177.192']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-6d74-480a-a496-492c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:27.000Z", "modified": "2018-03-13T13:33:27.000Z", "pattern": "[domain-name:value = 'hyperpatriotick.megabulkmessage246.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6ccc-4c94-919e-49e6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:27.000Z", "modified": "2018-03-13T13:33:27.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.211.224']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-f774-49e9-b165-4e6f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:27.000Z", "modified": "2018-03-13T13:33:27.000Z", "pattern": "[domain-name:value = 'igjqwnedjgqwnqwemnta.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-72a0-4dfc-88bc-4fd3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:28.000Z", "modified": "2018-03-13T13:33:28.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.30.6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-6fe0-409c-ba96-4719950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:28.000Z", "modified": "2018-03-13T13:33:28.000Z", "pattern": "[domain-name:value = 'iinashenty.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-78d8-47bb-be56-481e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:29.000Z", "modified": "2018-03-13T13:33:29.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.53.127']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-d910-4f1d-8241-4f15950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:29.000Z", "modified": "2018-03-13T13:33:29.000Z", "pattern": "[domain-name:value = 'ijdqnwdquwdoasidj.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-91d0-442d-af94-40f5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:29.000Z", "modified": "2018-03-13T13:33:29.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.71.174']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-31d8-4548-84ec-415a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:30.000Z", "modified": "2018-03-13T13:33:30.000Z", "pattern": "[domain-name:value = 'ijqdjqnwiduqujqiuezxc.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b2fc-4fd9-8f8a-43c6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:30.000Z", "modified": "2018-03-13T13:33:30.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.87.46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8910-4e36-9527-4fe5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:31.000Z", "modified": "2018-03-13T13:33:31.000Z", "pattern": "[domain-name:value = 'ijqudqjweomasndqw.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bd80-4625-ac3a-47db950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:31.000Z", "modified": "2018-03-13T13:33:31.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.186.129.175']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-fa10-4537-b97a-4d19950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:31.000Z", "modified": "2018-03-13T13:33:31.000Z", "pattern": "[domain-name:value = 'includeandcomdamage.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a66c-4e4e-b6e2-4b51950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:32.000Z", "modified": "2018-03-13T13:33:32.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.42.194.116']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-6e94-4130-b608-4474950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:32.000Z", "modified": "2018-03-13T13:33:32.000Z", "pattern": "[domain-name:value = 'includingretainaand.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-aab0-4e40-8494-445b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:32.000Z", "modified": "2018-03-13T13:33:32.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.47.5.4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-eb4c-4c8f-9d0c-4547950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:33.000Z", "modified": "2018-03-13T13:33:33.000Z", "pattern": "[domain-name:value = 'indefinablyt.message-services-239.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-7038-4899-808e-4008950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:33.000Z", "modified": "2018-03-13T13:33:33.000Z", "pattern": "[domain-name:value = 'ing-direct.co']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9fb8-4b54-94a1-414e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:34.000Z", "modified": "2018-03-13T13:33:34.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.94.4.228']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-f0d8-4c49-844e-4273950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:34.000Z", "modified": "2018-03-13T13:33:34.000Z", "pattern": "[domain-name:value = 'insubmissiveo.megabulkmessage245.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9a9c-41d8-9d8b-44e5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:34.000Z", "modified": "2018-03-13T13:33:34.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.33.186.71']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-70b0-485d-b589-48fa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:35.000Z", "modified": "2018-03-13T13:33:35.000Z", "pattern": "[domain-name:value = 'ipomnjdhaweenbi.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-825c-4686-8366-48af950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:35.000Z", "modified": "2018-03-13T13:33:35.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.49.11.132']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-e214-4fcb-87bf-442d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:36.000Z", "modified": "2018-03-13T13:33:36.000Z", "pattern": "[domain-name:value = 'iuodqndiqndunqwbqwe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-53d8-4be7-8afd-4df9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:36.000Z", "modified": "2018-03-13T13:33:36.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.49.41.240']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-74ac-4fe3-b925-4979950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:36.000Z", "modified": "2018-03-13T13:33:36.000Z", "pattern": "[domain-name:value = 'jajzonjgjzkfjene.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4430-4d09-919f-4c37950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:37.000Z", "modified": "2018-03-13T13:33:37.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.49.9.164']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-ffd8-4ecb-bdff-4ddb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:37.000Z", "modified": "2018-03-13T13:33:37.000Z", "pattern": "[domain-name:value = 'jhijdqwughasndaseqw.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-3d20-4140-86ef-4aaf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:38.000Z", "modified": "2018-03-13T13:33:38.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.50.90.58']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-8208-4759-9baa-4f91950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:38.000Z", "modified": "2018-03-13T13:33:38.000Z", "pattern": "[domain-name:value = 'juventudez.datingmailll.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-51cc-46b3-8987-474f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:38.000Z", "modified": "2018-03-13T13:33:38.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.50.93.30']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-0690-41b6-90d1-47d2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:39.000Z", "modified": "2018-03-13T13:33:39.000Z", "pattern": "[domain-name:value = 'kasmeniaksdneqweoo.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-573c-4df3-b865-42a2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:39.000Z", "modified": "2018-03-13T13:33:39.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.50.98.163']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-9cac-4c93-b505-4c66950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:39.000Z", "modified": "2018-03-13T13:33:39.000Z", "pattern": "[domain-name:value = 'kkansdqwjeeqbnvczmxc.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-728c-45ce-9cde-4ed3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:40.000Z", "modified": "2018-03-13T13:33:40.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.52.122.175']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-faec-42c8-b51e-426b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:40.000Z", "modified": "2018-03-13T13:33:40.000Z", "pattern": "[domain-name:value = 'knuckledd.megabulkmessage240.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6028-4d1c-9e2c-49e6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:41.000Z", "modified": "2018-03-13T13:33:41.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.73.245.226']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-673c-42a3-b31d-4541950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:41.000Z", "modified": "2018-03-13T13:33:41.000Z", "pattern": "[domain-name:value = 'kootenayk.francegirls.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4b6c-4e0d-b8ae-4fab950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:41.000Z", "modified": "2018-03-13T13:33:41.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.74.208.84']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-dc24-4a89-8c24-4b88950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:42.000Z", "modified": "2018-03-13T13:33:42.000Z", "pattern": "[domain-name:value = 'kormoviedelaanymanytree.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-238c-4753-99c1-4ecc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:42.000Z", "modified": "2018-03-13T13:33:42.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.87.135.2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-49a0-419f-88e9-4eb4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:43.000Z", "modified": "2018-03-13T13:33:43.000Z", "pattern": "[domain-name:value = 'kormushkinskasneqwe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1aec-4465-b9b4-4412950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:43.000Z", "modified": "2018-03-13T13:33:43.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.126.9.128']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-c84c-4988-8aab-439b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:43.000Z", "modified": "2018-03-13T13:33:43.000Z", "pattern": "[domain-name:value = 'kornilaniusanymanytron.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f9b0-47e6-aa48-409a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:44.000Z", "modified": "2018-03-13T13:33:44.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.127.95.144']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-3d98-4daa-a1e9-4297950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:44.000Z", "modified": "2018-03-13T13:33:44.000Z", "pattern": "[domain-name:value = 'kqeopgmamkwjwewe.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-02a4-4467-be1c-4ff3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:45.000Z", "modified": "2018-03-13T13:33:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.129.254.9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-c734-482c-88c9-469c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:45.000Z", "modified": "2018-03-13T13:33:45.000Z", "pattern": "[domain-name:value = 'kronashjeeeaqqforny.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-204c-4200-838e-40d7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:45.000Z", "modified": "2018-03-13T13:33:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.138.148.150']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-489c-411c-912f-4e63950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:46.000Z", "modified": "2018-03-13T13:33:46.000Z", "pattern": "[domain-name:value = 'lago222.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5758-442a-af2c-440a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:46.000Z", "modified": "2018-03-13T13:33:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.142.151.4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-cf7c-4e50-a6df-4688950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:46.000Z", "modified": "2018-03-13T13:33:46.000Z", "pattern": "[domain-name:value = 'lairdieb.francegirls.club']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-79b0-48d3-8f92-48a5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:47.000Z", "modified": "2018-03-13T13:33:47.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.172.83.254']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-60e8-44f3-abb2-4e06950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:47.000Z", "modified": "2018-03-13T13:33:47.000Z", "pattern": "[domain-name:value = 'lampflowerg.message-services-229.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ca20-43e3-9634-44a7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:48.000Z", "modified": "2018-03-13T13:33:48.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.172.83.94']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-dff8-40ae-bcea-488f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:48.000Z", "modified": "2018-03-13T13:33:48.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.173.245.178']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-e764-4326-ac50-4544950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:48.000Z", "modified": "2018-03-13T13:33:48.000Z", "pattern": "[domain-name:value = 'leadingss.message-services-227.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f56c-42ed-ab91-4166950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:49.000Z", "modified": "2018-03-13T13:33:49.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.208.134.201']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-69f8-4902-8c3d-42cc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:49.000Z", "modified": "2018-03-13T13:33:49.000Z", "pattern": "[domain-name:value = 'liceindividualshall.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-eec0-4ecd-85c5-4c18950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:50.000Z", "modified": "2018-03-13T13:33:50.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.237.190.24']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ee54-480f-b4ee-4eea950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:50.000Z", "modified": "2018-03-13T13:33:50.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.139.65']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-0140-42b4-aa48-420e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:50.000Z", "modified": "2018-03-13T13:33:50.000Z", "pattern": "[domain-name:value = 'limmayyouramake.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-7d30-4578-b4f5-445b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:51.000Z", "modified": "2018-03-13T13:33:51.000Z", "pattern": "[domain-name:value = 'lipothymich.message-services-206.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d100-4708-94d8-47f7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:51.000Z", "modified": "2018-03-13T13:33:51.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.146.131']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-0e9c-49ff-9e87-4841950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:51.000Z", "modified": "2018-03-13T13:33:51.000Z", "pattern": "[domain-name:value = 'lkamanbvcvzhaejw.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f290-432f-a28f-4739950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:52.000Z", "modified": "2018-03-13T13:33:52.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.153.71']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ce34-43be-9797-4be4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:52.000Z", "modified": "2018-03-13T13:33:52.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.154.26']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-92c0-45c3-970f-4ec7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:53.000Z", "modified": "2018-03-13T13:33:53.000Z", "pattern": "[domain-name:value = 'marantas.white-messages-225.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d14c-4b30-a425-4485950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:53.000Z", "modified": "2018-03-13T13:33:53.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.160.64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-210c-4346-af3d-43c7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:53.000Z", "modified": "2018-03-13T13:33:53.000Z", "pattern": "[domain-name:value = 'mcduck.org']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b6b4-4313-a8fe-46ad950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:54.000Z", "modified": "2018-03-13T13:33:54.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.161.255']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-9a40-4328-b313-4a3a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:54.000Z", "modified": "2018-03-13T13:33:54.000Z", "pattern": "[domain-name:value = 'mcduck.top']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b134-4c2e-bfc0-414b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:55.000Z", "modified": "2018-03-13T13:33:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.169.148']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-030c-4963-ab37-4403950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:55.000Z", "modified": "2018-03-13T13:33:55.000Z", "pattern": "[domain-name:value = 'media.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a3e4-4a88-aba7-47f5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:55.000Z", "modified": "2018-03-13T13:33:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.173.106']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-9284-40b5-83d7-4ea4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:56.000Z", "modified": "2018-03-13T13:33:56.000Z", "pattern": "[domain-name:value = 'mincludesthisincluding.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b37c-4b47-ad63-4ccd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:56.000Z", "modified": "2018-03-13T13:33:56.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.178.48']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-17d4-4df1-8712-4d23950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:56.000Z", "modified": "2018-03-13T13:33:56.000Z", "pattern": "[domain-name:value = 'minimalsr.message-services-229.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b374-4eba-85bd-41fc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:57.000Z", "modified": "2018-03-13T13:33:57.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.252.114']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-94f0-40c6-b3ce-466b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:57.000Z", "modified": "2018-03-13T13:33:57.000Z", "pattern": "[domain-name:value = 'miscapoerasun.ws']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ba10-41a1-844d-43aa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:58.000Z", "modified": "2018-03-13T13:33:58.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.26.64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-f4c0-4e15-8274-481c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:58.000Z", "modified": "2018-03-13T13:33:58.000Z", "pattern": "[domain-name:value = 'mitelinaris.top']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c2a0-4fb1-852b-4bca950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:58.000Z", "modified": "2018-03-13T13:33:58.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.254.142.91']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-7d30-4bcc-94d7-4b26950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:59.000Z", "modified": "2018-03-13T13:33:59.000Z", "pattern": "[domain-name:value = 'mnhgrewqfdsjh.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d238-4d2c-b00e-4c3b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:33:59.000Z", "modified": "2018-03-13T13:33:59.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.254.187.254']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:33:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-f088-4075-b41e-4ad5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:00.000Z", "modified": "2018-03-13T13:34:00.000Z", "pattern": "[domain-name:value = 'mnmnzxczxcasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c4e8-4cf9-bb98-450e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:00.000Z", "modified": "2018-03-13T13:34:00.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.254.205.37']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-6e08-4b09-b7ab-4856950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:00.000Z", "modified": "2018-03-13T13:34:00.000Z", "pattern": "[domain-name:value = 'mnzxbcasaaaty.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c79c-4425-957a-42fa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:01.000Z", "modified": "2018-03-13T13:34:01.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.44.66']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-ee44-439a-93a9-4bdb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:01.000Z", "modified": "2018-03-13T13:34:01.000Z", "pattern": "[domain-name:value = 'mormaornasieasdmnqwje.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b1b4-43f7-bdc2-468e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:01.000Z", "modified": "2018-03-13T13:34:01.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.5.184']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-73f8-4c57-a0db-4592950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:02.000Z", "modified": "2018-03-13T13:34:02.000Z", "pattern": "[domain-name:value = 'mrazostasosihuiogromnie.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a720-4233-a24d-4634950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:02.000Z", "modified": "2018-03-13T13:34:02.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.119.100']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-efe8-4c5c-95cb-491a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:03.000Z", "modified": "2018-03-13T13:34:03.000Z", "pattern": "[domain-name:value = 'mycodermat.message-services-234.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9c28-4617-b260-49e7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:03.000Z", "modified": "2018-03-13T13:34:03.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.138.139']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-72e0-4f68-aba0-40ef950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:03.000Z", "modified": "2018-03-13T13:34:03.000Z", "pattern": "[domain-name:value = 'naheqbhbzgbnqbza.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a4b8-4c58-b24f-4b35950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:04.000Z", "modified": "2018-03-13T13:34:04.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.176.126']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b780-c8ec-46a6-9557-41c6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:04.000Z", "modified": "2018-03-13T13:34:04.000Z", "pattern": "[domain-name:value = 'nandcopynotsource.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bbbc-485e-859c-4c07950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:05.000Z", "modified": "2018-03-13T13:34:05.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.234.205']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-47bc-426b-9431-45a5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:05.000Z", "modified": "2018-03-13T13:34:05.000Z", "pattern": "[domain-name:value = 'nasathisincluding.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ce10-4d56-9124-4474950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:05.000Z", "modified": "2018-03-13T13:34:05.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.43.76']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-aaac-4774-91e5-49f7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:06.000Z", "modified": "2018-03-13T13:34:06.000Z", "pattern": "[domain-name:value = 'nbhvnfhrnmc.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bc10-4163-a86c-4a28950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:06.000Z", "modified": "2018-03-13T13:34:06.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.90.183']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-21ec-4452-8f14-4802950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:06.000Z", "modified": "2018-03-13T13:34:06.000Z", "pattern": "[domain-name:value = 'nexiverifica.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d3dc-4af4-931e-46fa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:07.000Z", "modified": "2018-03-13T13:34:07.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.139.64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-7e9c-43f5-ba21-4fd6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:07.000Z", "modified": "2018-03-13T13:34:07.000Z", "pattern": "[domain-name:value = 'njsjdnasbdwdd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c5c4-4f79-9fd0-46ec950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:08.000Z", "modified": "2018-03-13T13:34:08.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.185.67']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2520-4e5f-8c98-4ff0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:08.000Z", "modified": "2018-03-13T13:34:08.000Z", "pattern": "[domain-name:value = 'nvnvnvnvcbcbcxbx.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e114-423d-9e09-4ecc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:08.000Z", "modified": "2018-03-13T13:34:08.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.193.102']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-a750-4238-bd84-4624950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:09.000Z", "modified": "2018-03-13T13:34:09.000Z", "pattern": "[domain-name:value = 'nvvnfjvnfjcdnj.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f494-49d7-9767-46ee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:09.000Z", "modified": "2018-03-13T13:34:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.198.173']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1ebc-477a-bd20-4352950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:10.000Z", "modified": "2018-03-13T13:34:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.226.49']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1e90-42ad-a0af-4698950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:11.000Z", "modified": "2018-03-13T13:34:11.000Z", "pattern": "[domain-name:value = 'oaijbuzxcunasdjn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5a78-46f4-a2f3-4618950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:11.000Z", "modified": "2018-03-13T13:34:11.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.87.46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9634-4aa6-a067-45ba950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:12.000Z", "modified": "2018-03-13T13:34:12.000Z", "pattern": "[domain-name:value = 'occasionallyl.dumareding.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8310-4208-83d5-4bee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:12.000Z", "modified": "2018-03-13T13:34:12.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.6.93.122']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-eab0-4e8c-9659-417a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:12.000Z", "modified": "2018-03-13T13:34:12.000Z", "pattern": "[domain-name:value = 'odkqiwhebqesdassdios.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-3c70-4d00-8169-4700950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:13.000Z", "modified": "2018-03-13T13:34:13.000Z", "pattern": "[domain-name:value = 'oirtmnbrctesnas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7b38-461e-b19f-4377950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:13.000Z", "modified": "2018-03-13T13:34:13.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.74.189.98']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9ab0-4298-a3c6-4c5f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:14.000Z", "modified": "2018-03-13T13:34:14.000Z", "pattern": "[domain-name:value = 'ojzasduqnwdwdqdqd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7428-4d6a-a8db-4ba7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:14.000Z", "modified": "2018-03-13T13:34:14.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '190.158.226.15']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-195c-4b3a-a530-43b6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:14.000Z", "modified": "2018-03-13T13:34:14.000Z", "pattern": "[domain-name:value = 'okasdmneqneeee.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5800-4c16-a5e5-45f8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:15.000Z", "modified": "2018-03-13T13:34:15.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '190.213.108.96']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9e48-47e2-8187-439b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:15.000Z", "modified": "2018-03-13T13:34:15.000Z", "pattern": "[domain-name:value = 'okdiqybgquwdnqwda.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5604-4c95-b99d-45c2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:16.000Z", "modified": "2018-03-13T13:34:16.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '190.218.94.128']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2334-4d22-93b3-453f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:16.000Z", "modified": "2018-03-13T13:34:16.000Z", "pattern": "[domain-name:value = 'okfqibhzxczzdqjwnqd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-659c-4c1b-9593-4daa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:17.000Z", "modified": "2018-03-13T13:34:17.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '190.219.202.4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-a62c-49f4-be70-490a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:17.000Z", "modified": "2018-03-13T13:34:17.000Z", "pattern": "[domain-name:value = 'okijgtfrbgkzamhjweeor.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7408-45b9-87b2-4a9d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:17.000Z", "modified": "2018-03-13T13:34:17.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '190.83.171.183']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-3cac-4e03-8ef7-45a7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:18.000Z", "modified": "2018-03-13T13:34:18.000Z", "pattern": "[domain-name:value = 'okjeintmotorsy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6c94-4f26-b278-42c2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:18.000Z", "modified": "2018-03-13T13:34:18.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.107.99.167']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7650-4d28-b952-437b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:19.000Z", "modified": "2018-03-13T13:34:19.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.224.93.48']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-c454-4635-a14f-4ea5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:19.000Z", "modified": "2018-03-13T13:34:19.000Z", "pattern": "[domain-name:value = 'okljulihyjhg.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9970-40c4-8fd1-4fea950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:19.000Z", "modified": "2018-03-13T13:34:19.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.33.1.19']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2f78-4f43-921f-4eda950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:20.000Z", "modified": "2018-03-13T13:34:20.000Z", "pattern": "[domain-name:value = 'okqdmwnenehsbndsd.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-99cc-4eab-be8a-4231950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:20.000Z", "modified": "2018-03-13T13:34:20.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.33.1.236']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-b658-46d1-91c0-468c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:21.000Z", "modified": "2018-03-13T13:34:21.000Z", "pattern": "[domain-name:value = 'onlyplacesattributionthe.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-aa2c-4a42-bbcc-4474950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:21.000Z", "modified": "2018-03-13T13:34:21.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.77.184.140']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2a14-4a0a-8430-46be950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:21.000Z", "modified": "2018-03-13T13:34:21.000Z", "pattern": "[domain-name:value = 'ooiiuuyy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bd48-42f6-8694-49ee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:22.000Z", "modified": "2018-03-13T13:34:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '194.116.183.233']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-a7f8-4ae6-9025-4c6e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:22.000Z", "modified": "2018-03-13T13:34:22.000Z", "pattern": "[domain-name:value = 'oonyasnytreeaggnra.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b7c8-44be-ad2e-4e7f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:22.000Z", "modified": "2018-03-13T13:34:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '194.204.25.137']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-163c-45fa-8f5e-4959950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:23.000Z", "modified": "2018-03-13T13:34:23.000Z", "pattern": "[domain-name:value = 'oooomaens.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-cae4-4727-87a3-4e01950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:23.000Z", "modified": "2018-03-13T13:34:23.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '195.222.40.54']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-8ac0-4042-ba99-4dd1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:24.000Z", "modified": "2018-03-13T13:34:24.000Z", "pattern": "[domain-name:value = 'oooweqwnenwqew.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-cc6c-4b18-bc18-495c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:24.000Z", "modified": "2018-03-13T13:34:24.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '195.228.41.2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-fcec-4f8e-a9dc-4628950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:24.000Z", "modified": "2018-03-13T13:34:24.000Z", "pattern": "[domain-name:value = 'oopsyinghhoasneas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0f94-4046-bf66-4067950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:25.000Z", "modified": "2018-03-13T13:34:25.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '196.178.101.1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-7eb8-4ad0-82b6-4206950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:25.000Z", "modified": "2018-03-13T13:34:25.000Z", "pattern": "[domain-name:value = 'opensslopensslremains.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2828-4c0b-833f-49df950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:26.000Z", "modified": "2018-03-13T13:34:26.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '196.20.111.10']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-0f5c-419d-9291-48d0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:26.000Z", "modified": "2018-03-13T13:34:26.000Z", "pattern": "[domain-name:value = 'opetheyoungthe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5a20-4c72-861a-4c86950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:26.000Z", "modified": "2018-03-13T13:34:26.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '197.255.225.249']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-7b48-4700-aa3b-4789950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:27.000Z", "modified": "2018-03-13T13:34:27.000Z", "pattern": "[domain-name:value = 'oqijwuneqascbqwee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6f30-4124-a4c2-4db1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:27.000Z", "modified": "2018-03-13T13:34:27.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '200.75.242.30']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-d668-4d8f-95d2-43cd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:28.000Z", "modified": "2018-03-13T13:34:28.000Z", "pattern": "[domain-name:value = 'overfillingi.googleboobs43.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9188-4076-b496-48b5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:28.000Z", "modified": "2018-03-13T13:34:28.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '200.91.115.40']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-3638-46d9-ac3d-42a3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:28.000Z", "modified": "2018-03-13T13:34:28.000Z", "pattern": "[domain-name:value = 'owkejanaezmzaeeqw.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9888-4f43-ada9-438e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:29.000Z", "modified": "2018-03-13T13:34:29.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '202.131.239.125']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-902c-46aa-937c-45dd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:29.000Z", "modified": "2018-03-13T13:34:29.000Z", "pattern": "[domain-name:value = 'paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-be64-4eba-a055-4873950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:29.000Z", "modified": "2018-03-13T13:34:29.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '202.170.71.172']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2198-4a4a-89fe-4df7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:30.000Z", "modified": "2018-03-13T13:34:30.000Z", "pattern": "[domain-name:value = 'paysell.me']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ccd0-44ef-9bc3-41c8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:30.000Z", "modified": "2018-03-13T13:34:30.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '202.175.83.34']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-a940-4501-ad81-4905950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:31.000Z", "modified": "2018-03-13T13:34:31.000Z", "pattern": "[domain-name:value = 'paysell.org']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e820-44b0-8b00-4f6e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:31.000Z", "modified": "2018-03-13T13:34:31.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '203.190.12.108']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-4b78-49ff-8b34-44e5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:32.000Z", "modified": "2018-03-13T13:34:32.000Z", "pattern": "[domain-name:value = 'paysell.ws']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ddf0-48c6-9b19-4d36950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:32.000Z", "modified": "2018-03-13T13:34:32.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '203.91.116.53']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-c6a0-4495-9bcd-48d0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:32.000Z", "modified": "2018-03-13T13:34:32.000Z", "pattern": "[domain-name:value = 'pedunculatedv.white-messages-242.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-4d80-41ce-b252-4769950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:33.000Z", "modified": "2018-03-13T13:34:33.000Z", "pattern": "[domain-name:value = 'permtheforredistrshould.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f6e8-4d3c-94a0-494a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:33.000Z", "modified": "2018-03-13T13:34:33.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.133.241.121']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-b138-4f8e-a14e-4f9c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:34.000Z", "modified": "2018-03-13T13:34:34.000Z", "pattern": "[domain-name:value = 'phaethusav.bulkmessage-208.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-02fc-4218-87b6-44c5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:34.000Z", "modified": "2018-03-13T13:34:34.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.45.77.106']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1680-433a-9671-49e1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:34.000Z", "modified": "2018-03-13T13:34:34.000Z", "pattern": "[domain-name:value = 'phlebectasyw.googleboobs43.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0934-4378-be42-465b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:35.000Z", "modified": "2018-03-13T13:34:35.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.50.76.174']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-6b60-4f37-8cdc-4107950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:35.000Z", "modified": "2018-03-13T13:34:35.000Z", "pattern": "[domain-name:value = 'photos.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-d878-41ca-8cf3-4e4d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:35.000Z", "modified": "2018-03-13T13:34:35.000Z", "pattern": "[domain-name:value = 'physicologicw.message-services-231.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-fe3c-4bdc-8400-4a67950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:36.000Z", "modified": "2018-03-13T13:34:36.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.93.154.120']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2e20-489b-9022-4337950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:36.000Z", "modified": "2018-03-13T13:34:36.000Z", "pattern": "[domain-name:value = 'piacabaq.message-services-220.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-fca4-4fcf-8457-4177950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:37.000Z", "modified": "2018-03-13T13:34:37.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.98.131.181']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9304-4d28-af5d-4da4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:37.000Z", "modified": "2018-03-13T13:34:37.000Z", "pattern": "[domain-name:value = 'plexometerc.message-services-229.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0b74-4278-990d-4675950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:37.000Z", "modified": "2018-03-13T13:34:37.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.113.187.11']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-f20c-4f67-9d73-4547950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:38.000Z", "modified": "2018-03-13T13:34:38.000Z", "pattern": "[domain-name:value = 'poiuartyuaneea.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-17ec-4ab9-8df0-4f01950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:38.000Z", "modified": "2018-03-13T13:34:38.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.113.187.7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-6a14-4cd5-b967-4636950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:39.000Z", "modified": "2018-03-13T13:34:39.000Z", "pattern": "[domain-name:value = 'polycodiumz.white-messages-221.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1aa0-4140-9baa-4ec4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:39.000Z", "modified": "2018-03-13T13:34:39.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.145.158.5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-c91c-4965-95a5-40d3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:39.000Z", "modified": "2018-03-13T13:34:39.000Z", "pattern": "[domain-name:value = 'pomvgrnqqeetree.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2204-49b4-ba4b-48a0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:40.000Z", "modified": "2018-03-13T13:34:40.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.149.152.120']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2310-4dbd-b927-4f26950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:40.000Z", "modified": "2018-03-13T13:34:40.000Z", "pattern": "[domain-name:value = 'pooiukjadnqwdjnqasdne.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1edc-4197-81bc-4b9f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:41.000Z", "modified": "2018-03-13T13:34:41.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.164.242.16']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-921c-4ede-9ea0-44aa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:41.000Z", "modified": "2018-03-13T13:34:41.000Z", "pattern": "[domain-name:value = 'portal.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2e74-45ca-a9ea-4d93950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:41.000Z", "modified": "2018-03-13T13:34:41.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.214.77.145']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-fe08-40d7-a913-4d68950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:42.000Z", "modified": "2018-03-13T13:34:42.000Z", "pattern": "[domain-name:value = 'potomuchtosrazuskazaleb.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4578-4f9a-b8e3-4d45950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:42.000Z", "modified": "2018-03-13T13:34:42.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.214.85.90']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-5f68-4fd3-8501-4454950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:43.000Z", "modified": "2018-03-13T13:34:43.000Z", "pattern": "[domain-name:value = 'poywebzhgkansdqanooytre.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-612c-40d7-9fa7-4b7b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:43.000Z", "modified": "2018-03-13T13:34:43.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.231.163.14']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-cc80-488c-97e9-4c93950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:43.000Z", "modified": "2018-03-13T13:34:43.000Z", "pattern": "[domain-name:value = 'pqjwenriiiasjdhewe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8bb8-43b8-acd5-4602950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:44.000Z", "modified": "2018-03-13T13:34:44.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.231.169.71']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1990-4f70-8438-4c27950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:44.000Z", "modified": "2018-03-13T13:34:44.000Z", "pattern": "[domain-name:value = 'presagersy.white-messages-207.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c580-48b8-8b63-429f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:45.000Z", "modified": "2018-03-13T13:34:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.231.178.240']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ec88-49e8-8010-4897950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:45.000Z", "modified": "2018-03-13T13:34:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.240.207.154']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-82c0-4f18-b910-4568950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:45.000Z", "modified": "2018-03-13T13:34:45.000Z", "pattern": "[domain-name:value = 'providedttconformunder.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-326c-49f4-94c0-4a75950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:46.000Z", "modified": "2018-03-13T13:34:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.6.121.106']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-e358-411a-b57e-46f0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:46.000Z", "modified": "2018-03-13T13:34:46.000Z", "pattern": "[domain-name:value = 'provliablepermissioncan.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4a9c-4381-a56e-4bb6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:46.000Z", "modified": "2018-03-13T13:34:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.6.58.250']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-46ac-442c-8a4e-4f3a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:47.000Z", "modified": "2018-03-13T13:34:47.000Z", "pattern": "[domain-name:value = 'prvtzone.biz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6844-4ddc-ad5b-4f02950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:47.000Z", "modified": "2018-03-13T13:34:47.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.74.138.66']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9d1c-4c8a-a4b8-4418950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:48.000Z", "modified": "2018-03-13T13:34:48.000Z", "pattern": "[domain-name:value = 'pyrenochaetac.message-services-229.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9528-45dd-bf1e-472e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:49.000Z", "modified": "2018-03-13T13:34:49.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '217.150.132.241']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-f7d8-4cc0-8ac1-433f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:49.000Z", "modified": "2018-03-13T13:34:49.000Z", "pattern": "[domain-name:value = 'qdijqwdunqwiqhwew.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d7ec-44ea-ab65-432a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:50.000Z", "modified": "2018-03-13T13:34:50.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '217.156.87.2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-580c-4c8d-bd84-4ebd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:50.000Z", "modified": "2018-03-13T13:34:50.000Z", "pattern": "[domain-name:value = 'qpweouplmmojdaiq.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-fe2c-4a1f-9e3c-4603950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:50.000Z", "modified": "2018-03-13T13:34:50.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '217.75.83.218']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-bc28-4126-94d3-4846950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:51.000Z", "modified": "2018-03-13T13:34:51.000Z", "pattern": "[domain-name:value = 'qwdioandjabnwhdaw.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1dc8-4f28-aa3b-4246950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:51.000Z", "modified": "2018-03-13T13:34:51.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '2.185.239.164']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2238-44e8-ac14-42dc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:52.000Z", "modified": "2018-03-13T13:34:52.000Z", "pattern": "[domain-name:value = 'qwdoimgnujaidgunqwdqd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-58bc-463f-a99a-4aaf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:52.000Z", "modified": "2018-03-13T13:34:52.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '2.90.176.63']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-8140-4263-87d5-4549950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:52.000Z", "modified": "2018-03-13T13:34:52.000Z", "pattern": "[domain-name:value = 'qwdojnfujnwabzxbcawodiqw.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6728-495a-a69a-4966950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:53.000Z", "modified": "2018-03-13T13:34:53.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '2.91.129.240']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-e23c-48ac-9deb-49f8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:53.000Z", "modified": "2018-03-13T13:34:53.000Z", "pattern": "[domain-name:value = 'qwdqundhaasdqwez.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-55f0-4d4c-bc29-49e0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:54.000Z", "modified": "2018-03-13T13:34:54.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.0.216.88']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-533c-4c62-a335-4091950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:54.000Z", "modified": "2018-03-13T13:34:54.000Z", "pattern": "[domain-name:value = 'qwokqweijzxcsqwsxc.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-ca18-421b-83f7-4b65950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:54.000Z", "modified": "2018-03-13T13:34:54.000Z", "pattern": "[domain-name:value = 'qwomdiforyouamwenta.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4e18-4615-b581-4f4c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:55.000Z", "modified": "2018-03-13T13:34:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.166.92.65']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-3ca8-46d5-a73a-42f3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:55.000Z", "modified": "2018-03-13T13:34:55.000Z", "pattern": "[domain-name:value = 'qwozijnbqbqqeybnbq.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4f3c-44b4-8085-4fda950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:55.000Z", "modified": "2018-03-13T13:34:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.166.97.137']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-b514-4379-b0f0-494b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:56.000Z", "modified": "2018-03-13T13:34:56.000Z", "pattern": "[domain-name:value = 'reboiseu.nomelee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6b54-4dcd-8307-4521950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:56.000Z", "modified": "2018-03-13T13:34:56.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.179.129.46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-3938-4d9a-9d01-49a3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:57.000Z", "modified": "2018-03-13T13:34:57.000Z", "pattern": "[domain-name:value = 'recedatearecarrycopy.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-60c0-44ee-b5dc-4e03950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:57.000Z", "modified": "2018-03-13T13:34:57.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.5.167.149']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9a98-4d9a-a9a8-44ac950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:57.000Z", "modified": "2018-03-13T13:34:57.000Z", "pattern": "[domain-name:value = 'redistributionsthefrom.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7a80-4976-b70d-4287950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:58.000Z", "modified": "2018-03-13T13:34:58.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.107.108.249']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-fdec-419c-b6cb-447f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:58.000Z", "modified": "2018-03-13T13:34:58.000Z", "pattern": "[domain-name:value = 'reincorporationp.googleboobs45.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-94a4-4597-b5d6-45c7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:59.000Z", "modified": "2018-03-13T13:34:59.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.107.95.128']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-8e2c-4a1e-98cd-440f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:59.000Z", "modified": "2018-03-13T13:34:59.000Z", "pattern": "[domain-name:value = 'reputablyz.francegirls.club']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c700-417b-bbb7-4f53950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:34:59.000Z", "modified": "2018-03-13T13:34:59.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.143.160.70']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:34:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1ffc-4818-bafd-45e3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:00.000Z", "modified": "2018-03-13T13:35:00.000Z", "pattern": "[domain-name:value = 'responsibleworktermsthe.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-faec-4219-b054-43b4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:00.000Z", "modified": "2018-03-13T13:35:00.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.143.200.179']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-a290-4f3c-b86f-432f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:01.000Z", "modified": "2018-03-13T13:35:01.000Z", "pattern": "[domain-name:value = 'retroauricularp.megabulkmessage240.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2514-4768-a41c-4ac5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:01.000Z", "modified": "2018-03-13T13:35:01.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.152.176.90']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-3eec-4336-8aee-4bb6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:01.000Z", "modified": "2018-03-13T13:35:01.000Z", "pattern": "[domain-name:value = 'royaldumps.cc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4bb8-40b9-8422-4eba950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:02.000Z", "modified": "2018-03-13T13:35:02.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.152.180.138']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-b94c-4d72-b28e-42ba950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:02.000Z", "modified": "2018-03-13T13:35:02.000Z", "pattern": "[domain-name:value = 'royaldumps.top']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7004-4df9-8e55-4141950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:02.000Z", "modified": "2018-03-13T13:35:02.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.196.158.76']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-3c44-4ab7-bf6a-4136950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:03.000Z", "modified": "2018-03-13T13:35:03.000Z", "pattern": "[domain-name:value = 'rtwjeuqwdyhqwdqwidjgha.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9770-4418-be49-472e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:03.000Z", "modified": "2018-03-13T13:35:03.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.26.55.51']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-d38c-4302-9c09-4814950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:04.000Z", "modified": "2018-03-13T13:35:04.000Z", "pattern": "[domain-name:value = 'scottfranch.org']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ad48-4379-aa2c-48c8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:04.000Z", "modified": "2018-03-13T13:35:04.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.60.136.83']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-5490-477a-b061-4e70950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:04.000Z", "modified": "2018-03-13T13:35:04.000Z", "pattern": "[domain-name:value = 'sdneewwewe.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-cb54-4326-83ee-4a95950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:05.000Z", "modified": "2018-03-13T13:35:05.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.60.136.94']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-cf54-41d8-a768-4a5a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:05.000Z", "modified": "2018-03-13T13:35:05.000Z", "pattern": "[domain-name:value = 'search.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e320-4f7b-a18e-433b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:06.000Z", "modified": "2018-03-13T13:35:06.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.110.200.194']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-5f30-4275-be6f-41e8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:06.000Z", "modified": "2018-03-13T13:35:06.000Z", "pattern": "[domain-name:value = 'seeyouinnebqe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-17d4-4776-9a15-4ef7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:06.000Z", "modified": "2018-03-13T13:35:06.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.221.163.203']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-df6c-4d72-9d5c-4d1b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:07.000Z", "modified": "2018-03-13T13:35:07.000Z", "pattern": "[domain-name:value = 'semicalcareousj.regbidom.pro']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2514-46fe-883f-42d1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:07.000Z", "modified": "2018-03-13T13:35:07.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.221.163.211']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-506c-4e78-ad56-46c9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:08.000Z", "modified": "2018-03-13T13:35:08.000Z", "pattern": "[domain-name:value = 'shderivativepartawork.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-46a4-4411-86da-4f96950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:08.000Z", "modified": "2018-03-13T13:35:08.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.226.17.116']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-bd20-41e3-87dd-4409950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:08.000Z", "modified": "2018-03-13T13:35:08.000Z", "pattern": "[domain-name:value = 'silksaajjha.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-71f8-434c-8dad-45f9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:09.000Z", "modified": "2018-03-13T13:35:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.67.12.80']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-245c-40e0-bcb0-4da9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:09.000Z", "modified": "2018-03-13T13:35:09.000Z", "pattern": "[domain-name:value = 'sofpolokatos.top']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a710-4bd7-8b33-40c2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:09.000Z", "modified": "2018-03-13T13:35:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.73.245.111']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9ad4-4014-937f-411d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:10.000Z", "modified": "2018-03-13T13:35:10.000Z", "pattern": "[domain-name:value = 'softwithininclma.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a76c-4198-9d9b-4be8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:10.000Z", "modified": "2018-03-13T13:35:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.74.170.134']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-259c-46ca-b3b2-47df950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:11.000Z", "modified": "2018-03-13T13:35:11.000Z", "pattern": "[domain-name:value = 'solaciouslyy.bulkmessage-219.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b31c-4c3d-a9e5-42da950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:11.000Z", "modified": "2018-03-13T13:35:11.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.115.112.10']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9188-4cee-acaa-4ef5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:11.000Z", "modified": "2018-03-13T13:35:11.000Z", "pattern": "[domain-name:value = 'solidaritiesn.bulkmessage-229.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c0c0-44fe-ae50-447a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:12.000Z", "modified": "2018-03-13T13:35:12.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.10.0.124']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-e154-4faf-8485-4150950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:12.000Z", "modified": "2018-03-13T13:35:12.000Z", "pattern": "[domain-name:value = 'soliphonetheseinnovative.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c248-4404-8a08-4f8b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:13.000Z", "modified": "2018-03-13T13:35:13.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.10.106.206']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-3ff8-4272-98f5-4bd7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:13.000Z", "modified": "2018-03-13T13:35:13.000Z", "pattern": "[domain-name:value = 'songlando.white-messages-242.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c240-4e5b-b24d-4a2c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:13.000Z", "modified": "2018-03-13T13:35:13.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.102.10.202']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-b2ec-4c12-8401-427c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:14.000Z", "modified": "2018-03-13T13:35:14.000Z", "pattern": "[domain-name:value = 'sourceandwri.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d87c-440a-8aa3-40c1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:14.000Z", "modified": "2018-03-13T13:35:14.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.102.10.77']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1dac-4883-ab4f-48b5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:15.000Z", "modified": "2018-03-13T13:35:15.000Z", "pattern": "[domain-name:value = 'sourcelicensethe.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ddec-405a-82b8-413c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:15.000Z", "modified": "2018-03-13T13:35:15.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.109.39.124']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-81c8-4af9-a246-435c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:15.000Z", "modified": "2018-03-13T13:35:15.000Z", "pattern": "[domain-name:value = 'sslmerchantability.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e3c0-4660-a13c-410a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:16.000Z", "modified": "2018-03-13T13:35:16.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.139.176.124']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-f64c-4172-8fa1-41cf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:16.000Z", "modified": "2018-03-13T13:35:16.000Z", "pattern": "[domain-name:value = 'stackersi.message-services-239.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e354-4432-91c2-453d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:17.000Z", "modified": "2018-03-13T13:35:17.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.139.176.151']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-85c4-4ec3-b9b3-4268950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:17.000Z", "modified": "2018-03-13T13:35:17.000Z", "pattern": "[domain-name:value = 'streams.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-eea0-470e-bf7c-4324950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:17.000Z", "modified": "2018-03-13T13:35:17.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.171.66.235']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-0088-41a4-ae58-408c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:18.000Z", "modified": "2018-03-13T13:35:18.000Z", "pattern": "[domain-name:value = 'submolecularq.white-messages-225.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2fd4-4a41-9852-46a4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:18.000Z", "modified": "2018-03-13T13:35:18.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.214.214.39']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-8704-4cd6-aea4-4c90950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:19.000Z", "modified": "2018-03-13T13:35:19.000Z", "pattern": "[domain-name:value = 'subrisoryk.bulkmessage-220.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-3ea4-4641-9271-4c04950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:19.000Z", "modified": "2018-03-13T13:35:19.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.237.114.237']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1488-4500-9848-4bf4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:19.000Z", "modified": "2018-03-13T13:35:19.000Z", "pattern": "[domain-name:value = 'sukiebanieotbitesotnas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-28bc-4c72-954a-43db950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:20.000Z", "modified": "2018-03-13T13:35:20.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.237.80.152']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-a9dc-4062-9cb6-469c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:20.000Z", "modified": "2018-03-13T13:35:20.000Z", "pattern": "[domain-name:value = 'sukiebuchnieohuelivobos.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2e2c-4ea9-9e10-4e2e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:20.000Z", "modified": "2018-03-13T13:35:20.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.238.18.157']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-4444-4e5d-8094-4130950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:21.000Z", "modified": "2018-03-13T13:35:21.000Z", "pattern": "[domain-name:value = 'superendorsementw.wallirum.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1cf4-4c52-b0c1-4f72950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:21.000Z", "modified": "2018-03-13T13:35:21.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.238.18.241']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-c228-4e78-866f-44a1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:22.000Z", "modified": "2018-03-13T13:35:22.000Z", "pattern": "[domain-name:value = 'technographerc.megabulkmessage224.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-23f4-4a45-8b49-49d7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:22.000Z", "modified": "2018-03-13T13:35:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.249.70.243']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-49d0-47fe-b144-4c99950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:22.000Z", "modified": "2018-03-13T13:35:22.000Z", "pattern": "[domain-name:value = 'tetraodonm.message-services-218.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-c9a8-4b43-b9f8-4242950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:23.000Z", "modified": "2018-03-13T13:35:23.000Z", "pattern": "[domain-name:value = 'thatderivativeworks.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-13e8-41b1-b016-40e7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:23.000Z", "modified": "2018-03-13T13:35:23.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.29.1.191']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1b04-45ae-b078-4423950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:24.000Z", "modified": "2018-03-13T13:35:24.000Z", "pattern": "[domain-name:value = 'theaaddendumrevisions.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1f98-4106-b94d-42e9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:24.000Z", "modified": "2018-03-13T13:35:24.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.40.123.136']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-6f1c-4a0f-960e-4b42950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:25.000Z", "modified": "2018-03-13T13:35:25.000Z", "pattern": "[domain-name:value = 'theandwithinfareth.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-fc68-4d8c-af9b-4186950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:25.000Z", "modified": "2018-03-13T13:35:25.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.47.105.160']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-bc2c-4812-9dea-48aa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:25.000Z", "modified": "2018-03-13T13:35:25.000Z", "pattern": "[domain-name:value = 'thedistributedderiv.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f364-46e9-8c12-44d3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:26.000Z", "modified": "2018-03-13T13:35:26.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.47.98.128']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2818-41b8-8bfe-4410950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:26.000Z", "modified": "2018-03-13T13:35:26.000Z", "pattern": "[domain-name:value = 'thefordistributeprovided.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-eb8c-438c-ac2c-4b28950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:26.000Z", "modified": "2018-03-13T13:35:26.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.55.145.49']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-7dc0-4b8d-a08f-40a0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:27.000Z", "modified": "2018-03-13T13:35:27.000Z", "pattern": "[domain-name:value = 'thetheandmetarefoll.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-df68-48ba-819c-4d05950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:27.000Z", "modified": "2018-03-13T13:35:27.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.104.188.117']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-bf7c-4517-b1a6-432e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:28.000Z", "modified": "2018-03-13T13:35:28.000Z", "pattern": "[domain-name:value = 'thislossmentioningope.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ee38-4e8c-83f0-4cad950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:28.000Z", "modified": "2018-03-13T13:35:28.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.12.133.137']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2974-44dd-b799-45fb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:28.000Z", "modified": "2018-03-13T13:35:28.000Z", "pattern": "[domain-name:value = 'time.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ed68-4a18-8203-4551950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:29.000Z", "modified": "2018-03-13T13:35:29.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '51.218.188.250']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-8818-462d-9ad3-45c7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:29.000Z", "modified": "2018-03-13T13:35:29.000Z", "pattern": "[domain-name:value = 'tmeansmderivinclusionent.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ffbc-4538-a36e-43ab950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:30.000Z", "modified": "2018-03-13T13:35:30.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.12.190.128']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-ed60-42f8-aa71-4288950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:30.000Z", "modified": "2018-03-13T13:35:30.000Z", "pattern": "[domain-name:value = 'torskitnasdnewpppoany.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-00e0-440a-855c-4d18950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:30.000Z", "modified": "2018-03-13T13:35:30.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.12.35.49']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-3944-4988-8d9f-4209950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:31.000Z", "modified": "2018-03-13T13:35:31.000Z", "pattern": "[domain-name:value = 'tradeherebymodifi.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f5e8-4303-b1d5-4049950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:31.000Z", "modified": "2018-03-13T13:35:31.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.13.147.253']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-7c2c-46f7-8a47-4b5d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:32.000Z", "modified": "2018-03-13T13:35:32.000Z", "pattern": "[domain-name:value = 'tragedienness.message-services-235.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ea8c-4cec-b6dd-4d89950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:32.000Z", "modified": "2018-03-13T13:35:32.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.20.124.103']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-d4f4-40d3-b62b-47d2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:32.000Z", "modified": "2018-03-13T13:35:32.000Z", "pattern": "[domain-name:value = 'trampersq.megabulkmessage204.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-fe70-4d3e-b613-4050950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:33.000Z", "modified": "2018-03-13T13:35:33.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.204.138.23']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-051c-4716-af5c-43ff950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:33.000Z", "modified": "2018-03-13T13:35:33.000Z", "pattern": "[domain-name:value = 'tranasportnmme.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ee64-43e5-91a0-45ff950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:34.000Z", "modified": "2018-03-13T13:35:34.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.137.47']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-31c0-4df7-9430-495c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:34.000Z", "modified": "2018-03-13T13:35:34.000Z", "pattern": "[domain-name:value = 'trhanisnaormasndiqwe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-eb3c-4cfc-bb29-4c23950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:34.000Z", "modified": "2018-03-13T13:35:34.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.142.196']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-8894-41f5-b564-4be3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:35.000Z", "modified": "2018-03-13T13:35:35.000Z", "pattern": "[domain-name:value = 'triethylaminep.megabulkmessage245.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-dbf8-4a4f-bddd-45ce950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:35.000Z", "modified": "2018-03-13T13:35:35.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.201.193']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-c85c-4231-8c05-4d5d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:36.000Z", "modified": "2018-03-13T13:35:36.000Z", "pattern": "[domain-name:value = 'trondyfeveryfeellnas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e67c-4861-95e2-4fb8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:36.000Z", "modified": "2018-03-13T13:35:36.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.238.18']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-043c-450d-b5ca-4d66950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:36.000Z", "modified": "2018-03-13T13:35:36.000Z", "pattern": "[domain-name:value = 'try2swipe.ws']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d6d4-42e3-9f04-42f1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:37.000Z", "modified": "2018-03-13T13:35:37.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.241.209']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-55fc-4b8e-b609-4358950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:37.000Z", "modified": "2018-03-13T13:35:37.000Z", "pattern": "[domain-name:value = 'tutoragef.message-services-234.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e220-4eb4-96ff-48e7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:38.000Z", "modified": "2018-03-13T13:35:38.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.53.140.195']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-fd70-4d44-88a9-426e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:38.000Z", "modified": "2018-03-13T13:35:38.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.56.73.146']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-904c-4569-9898-4dee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:38.000Z", "modified": "2018-03-13T13:35:38.000Z", "pattern": "[domain-name:value = 'tuyngsdnfwefwef.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-15a0-4f39-be14-4f4c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:39.000Z", "modified": "2018-03-13T13:35:39.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.8.11.155']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-d014-40cd-b016-4b8c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:39.000Z", "modified": "2018-03-13T13:35:39.000Z", "pattern": "[domain-name:value = 'uiunhdmansdsddsx.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2e98-4afa-a81c-479a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:40.000Z", "modified": "2018-03-13T13:35:40.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.100.255.25']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-16e4-421d-b264-439e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:40.000Z", "modified": "2018-03-13T13:35:40.000Z", "pattern": "[domain-name:value = 'unclesam.ws']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2f58-4cba-bd99-4690950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:41.000Z", "modified": "2018-03-13T13:35:41.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.121.111.127']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-4518-4ecc-bf3e-44f2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:41.000Z", "modified": "2018-03-13T13:35:41.000Z", "pattern": "[domain-name:value = 'undergenerals.bulkmessage-231.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4d64-4925-a452-48d5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:41.000Z", "modified": "2018-03-13T13:35:41.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.231.108.213']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-81c0-47fd-8d85-4f96950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:42.000Z", "modified": "2018-03-13T13:35:42.000Z", "pattern": "[domain-name:value = 'unenslaveds.bulkmessage-238.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-746c-4db6-a80d-421b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:35:55.000Z", "modified": "2018-03-13T11:35:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.61.60.204']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:35:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-ca20-4ace-99f7-481d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:42.000Z", "modified": "2018-03-13T13:35:42.000Z", "pattern": "[domain-name:value = 'unintellectualo.neospfsgear.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8530-48a0-9bcf-4e56950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:35:55.000Z", "modified": "2018-03-13T11:35:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.61.60.204']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:35:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2090-46ad-a8f0-481d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:43.000Z", "modified": "2018-03-13T13:35:43.000Z", "pattern": "[domain-name:value = 'uniseriali.megabulkmessage218.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b660-40d8-b0a6-4788950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:43.000Z", "modified": "2018-03-13T13:35:43.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.73.70.146']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9000-4f9d-9988-4d67950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:44.000Z", "modified": "2018-03-13T13:35:44.000Z", "pattern": "[domain-name:value = 'unposthumousm.bulkmessage-229.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b0e0-4196-bbbe-4802950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:44.000Z", "modified": "2018-03-13T13:35:44.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.85.88.113']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-0e48-48ad-ae44-491f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:44.000Z", "modified": "2018-03-13T13:35:44.000Z", "pattern": "[domain-name:value = 'unprepossessingnessu.mailer-service230.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b90c-4f22-b63c-47a5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:45.000Z", "modified": "2018-03-13T13:35:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.235.14.166']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-82cc-48d8-b438-4b9f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:45.000Z", "modified": "2018-03-13T13:35:45.000Z", "pattern": "[domain-name:value = 'unrequestedw.message-services-236.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c840-42f0-af39-4bfd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:46.000Z", "modified": "2018-03-13T13:35:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.70.100.139']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-cfdc-4937-b85f-42e9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:46.000Z", "modified": "2018-03-13T13:35:46.000Z", "pattern": "[domain-name:value = 'unsacerdotallyk.bulkmessage-206.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c518-4443-9b2c-4c58950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:46.000Z", "modified": "2018-03-13T13:35:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.70.124.174']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-4a3c-4bdd-a59c-4d22950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:47.000Z", "modified": "2018-03-13T13:35:47.000Z", "pattern": "[domain-name:value = 'upstrikez.francegirls.club']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c31c-4112-8706-4268950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:47.000Z", "modified": "2018-03-13T13:35:47.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.81.21.110']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-c050-4226-b9a9-4d7b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:48.000Z", "modified": "2018-03-13T13:35:48.000Z", "pattern": "[domain-name:value = 'usedformsopensslofor.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d69c-4549-8ea5-4dbf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:48.000Z", "modified": "2018-03-13T13:35:48.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.81.55.140']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-3344-44e1-8ef4-44cb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:48.000Z", "modified": "2018-03-13T13:35:48.000Z", "pattern": "[domain-name:value = 'vbnmfghoiuytrasdtoooasne.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-df2c-4433-8dcf-44f5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:49.000Z", "modified": "2018-03-13T13:35:49.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.85.254.83']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-aae8-484e-8409-465f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:49.000Z", "modified": "2018-03-13T13:35:49.000Z", "pattern": "[domain-name:value = 'verified.vc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f504-4598-85ae-44a1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:50.000Z", "modified": "2018-03-13T13:35:50.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.100.193.22']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1f6c-4088-b6fe-47e0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:50.000Z", "modified": "2018-03-13T13:35:50.000Z", "pattern": "[domain-name:value = 'verifyandmeet.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f2a4-4ada-9575-4fde950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:50.000Z", "modified": "2018-03-13T13:35:50.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.171.93.223']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9a30-4810-9646-4a29950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:51.000Z", "modified": "2018-03-13T13:35:51.000Z", "pattern": "[domain-name:value = 'ver.sceinsheru.org']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1f88-4a5b-b41b-41af950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:51.000Z", "modified": "2018-03-13T13:35:51.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.173.198.130']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-0810-4bbd-9b9c-4ed6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:52.000Z", "modified": "2018-03-13T13:35:52.000Z", "pattern": "[domain-name:value = 'visukisovsemohuelipadlieb.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-3a10-4d9a-9871-4d87950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:52.000Z", "modified": "2018-03-13T13:35:52.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.28.210.44']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-8464-4b26-9ecc-4360950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:52.000Z", "modified": "2018-03-13T13:35:52.000Z", "pattern": "[domain-name:value = 'vnxirmdjasadadasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-62a8-4a56-a180-4e0f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:53.000Z", "modified": "2018-03-13T13:35:53.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.28.210.62']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-817c-453e-affc-4226950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:53.000Z", "modified": "2018-03-13T13:35:53.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.31.63.30']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1c10-4478-8a07-4a67950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:54.000Z", "modified": "2018-03-13T13:35:54.000Z", "pattern": "[domain-name:value = 'wdiqwdjhruaayyyyasdddd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-b7a4-4745-ae07-4eb2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:54.000Z", "modified": "2018-03-13T13:35:54.000Z", "pattern": "[domain-name:value = 'web.googlemehard.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8f84-40f3-85bb-452b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:54.000Z", "modified": "2018-03-13T13:35:54.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.38.114.17']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b114-4b2a-97af-40c9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:55.000Z", "modified": "2018-03-13T13:35:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.40.139.73']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-52d4-4302-a3c8-4299950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:55.000Z", "modified": "2018-03-13T13:35:55.000Z", "pattern": "[domain-name:value = 'weshelgoaouyntwany.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bb34-4c9b-81fd-4a22950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:56.000Z", "modified": "2018-03-13T13:35:56.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.40.42.64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-cdec-417a-b3f7-4fb7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:56.000Z", "modified": "2018-03-13T13:35:56.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.56.206.78']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-e058-4269-b215-4b0e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:56.000Z", "modified": "2018-03-13T13:35:56.000Z", "pattern": "[domain-name:value = 'windflawsm.dondigispfs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-6670-42b5-a763-442d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:57.000Z", "modified": "2018-03-13T13:35:57.000Z", "pattern": "[domain-name:value = 'withadvertisingthe.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-be44-462c-9caf-4afe950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:57.000Z", "modified": "2018-03-13T13:35:57.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.83.94.150']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9ca4-4a41-916c-4740950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:58.000Z", "modified": "2018-03-13T13:35:58.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.84.159.213']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-01a0-4aed-87a5-4e91950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:58.000Z", "modified": "2018-03-13T13:35:58.000Z", "pattern": "[domain-name:value = 'withoutownworksinfrtrade.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-852c-437e-92fa-4c8c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:58.000Z", "modified": "2018-03-13T13:35:58.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.90.107.166']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-5cc0-4fac-bace-4c6e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:59.000Z", "modified": "2018-03-13T13:35:59.000Z", "pattern": "[domain-name:value = 'withsaallwarranties.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5c84-416a-834f-4ffe950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:35:59.000Z", "modified": "2018-03-13T13:35:59.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.90.243.124']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:35:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-c974-4a46-b6bb-4663950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:00.000Z", "modified": "2018-03-13T13:36:00.000Z", "pattern": "[domain-name:value = 'wknfolbmhngjdeee.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-68fc-4fbb-8345-4563950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:00.000Z", "modified": "2018-03-13T13:36:00.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.93.238.148']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-4a78-4d49-8ecb-46f7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:00.000Z", "modified": "2018-03-13T13:36:00.000Z", "pattern": "[domain-name:value = 'wodmaiwdazzxss.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-731c-44db-b62d-41b8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:01.000Z", "modified": "2018-03-13T13:36:01.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.96.179.201']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-f228-4204-be34-4bb6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:01.000Z", "modified": "2018-03-13T13:36:01.000Z", "pattern": "[domain-name:value = 'woeqqoaaasnegfds.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6c70-402c-ad96-470a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:02.000Z", "modified": "2018-03-13T13:36:02.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.96.200.254']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-7714-483d-bc9a-4208950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:02.000Z", "modified": "2018-03-13T13:36:02.000Z", "pattern": "[domain-name:value = 'workrepresentatives.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6a74-426f-8476-408d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:02.000Z", "modified": "2018-03-13T13:36:02.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.97.134.202']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-fd90-4fce-825e-4e74950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:03.000Z", "modified": "2018-03-13T13:36:03.000Z", "pattern": "[domain-name:value = 'wothetotheeither.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-76ec-494f-b9eb-4a73950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:03.000Z", "modified": "2018-03-13T13:36:03.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.97.143.90']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9474-4905-b4a6-4541950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:03.000Z", "modified": "2018-03-13T13:36:03.000Z", "pattern": "[domain-name:value = 'woweoanafmzjvdqew.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-522c-4e04-8849-4594950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:04.000Z", "modified": "2018-03-13T13:36:04.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.97.189.169']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2e78-4e45-994f-43b9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:04.000Z", "modified": "2018-03-13T13:36:04.000Z", "pattern": "[domain-name:value = 'wqoekwqejadfnbawd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-3988-41fe-846b-42e8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:05.000Z", "modified": "2018-03-13T13:36:05.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.97.37.20']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-b364-437d-900a-4a65950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:05.000Z", "modified": "2018-03-13T13:36:05.000Z", "pattern": "[domain-name:value = 'www.aandeegnaeany.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1400-414f-a7a6-444a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:05.000Z", "modified": "2018-03-13T13:36:05.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.97.64.138']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-4d04-43c6-b1da-48a5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:06.000Z", "modified": "2018-03-13T13:36:06.000Z", "pattern": "[domain-name:value = 'www.adojqnwdiqzxcqwdqwn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-064c-41d2-89b4-446b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:06.000Z", "modified": "2018-03-13T13:36:06.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.100.141.176']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-0bc0-4e4a-a9a8-45ff950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:06.000Z", "modified": "2018-03-13T13:36:06.000Z", "pattern": "[domain-name:value = 'www.arniytreegoogofastii.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d69c-452c-a43e-4b44950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:07.000Z", "modified": "2018-03-13T13:36:07.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.100.54.64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-8eb8-406a-baaa-4588950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:07.000Z", "modified": "2018-03-13T13:36:07.000Z", "pattern": "[domain-name:value = 'www.asdljnoqwdnoqwdqwqwwqe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b9ac-4f2e-a0f7-4e48950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:08.000Z", "modified": "2018-03-13T13:36:08.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.112.132.28']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-0404-4a4a-a6c5-42c6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:08.000Z", "modified": "2018-03-13T13:36:08.000Z", "pattern": "[domain-name:value = 'www.bccxgddsiugjj.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ba6c-47f8-ae02-437c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:08.000Z", "modified": "2018-03-13T13:36:08.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.112.140.180']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-7b44-4a03-a873-4897950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:09.000Z", "modified": "2018-03-13T13:36:09.000Z", "pattern": "[domain-name:value = 'www.cothenahudson.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bb2c-4681-b7b3-4b96950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:09.000Z", "modified": "2018-03-13T13:36:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.112.164.104']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9c48-4ec0-8b50-401b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:10.000Z", "modified": "2018-03-13T13:36:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.112.164.146']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2358-42c0-8587-4976950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:10.000Z", "modified": "2018-03-13T13:36:10.000Z", "pattern": "[domain-name:value = 'www.csh0p.ru']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6d60-4c08-a0e7-4527950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:10.000Z", "modified": "2018-03-13T13:36:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.113.247.141']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-964c-4419-9f76-43a5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:11.000Z", "modified": "2018-03-13T13:36:11.000Z", "pattern": "[domain-name:value = 'www.cvvshop.lv']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-39c8-4dc7-b31e-416e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:11.000Z", "modified": "2018-03-13T13:36:11.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.114.188.203']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1cc8-435f-9f2b-43cd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:12.000Z", "modified": "2018-03-13T13:36:12.000Z", "pattern": "[domain-name:value = 'www.diuhqioduqwdioqdhuqwd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-19b8-4820-b2c4-4ab4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:12.000Z", "modified": "2018-03-13T13:36:12.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.114.8.130']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-9728-4c8b-bd10-4b13950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:12.000Z", "modified": "2018-03-13T13:36:12.000Z", "pattern": "[domain-name:value = 'www.foradocumentcontr.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1c14-45ef-8699-4aa2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:13.000Z", "modified": "2018-03-13T13:36:13.000Z", "pattern": "[domain-name:value = 'www.fqiwdkigjuiandasdasdj.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f430-4714-a593-4bb6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:13.000Z", "modified": "2018-03-13T13:36:13.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.115.122.218']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-aa60-4547-a889-4250950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:13.000Z", "modified": "2018-03-13T13:36:13.000Z", "pattern": "[domain-name:value = 'www.hdclips111.xyz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c28c-4ef6-a819-4926950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:14.000Z", "modified": "2018-03-13T13:36:14.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.115.24.255']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-4338-47b2-8fa3-459c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:14.000Z", "modified": "2018-03-13T13:36:14.000Z", "pattern": "[domain-name:value = 'www.jhijdqwughasndaseqw.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a8bc-4511-882f-4c7f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:15.000Z", "modified": "2018-03-13T13:36:15.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.117.116.170']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-81a4-4b5d-8883-4b2d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:15.000Z", "modified": "2018-03-13T13:36:15.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.117.52.225']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-ce64-40cc-93ce-435e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:15.000Z", "modified": "2018-03-13T13:36:15.000Z", "pattern": "[domain-name:value = 'www.kronashjeeeaqqforny.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-53e8-4efa-9872-494f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:16.000Z", "modified": "2018-03-13T13:36:16.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.117.57.208']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-0850-42eb-ad14-4c8c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:16.000Z", "modified": "2018-03-13T13:36:16.000Z", "pattern": "[domain-name:value = 'www.mcduck.org']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1948-4988-a86b-4684950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:17.000Z", "modified": "2018-03-13T13:36:17.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.118.196.1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-a4ac-4b62-896a-46ee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:17.000Z", "modified": "2018-03-13T13:36:17.000Z", "pattern": "[domain-name:value = 'www.mcduck.top']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2110-4782-b3ce-4cee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:17.000Z", "modified": "2018-03-13T13:36:17.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.118.249.205']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-286c-49ae-a577-489b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:18.000Z", "modified": "2018-03-13T13:36:18.000Z", "pattern": "[domain-name:value = 'www.mnmnzxczxcasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1f78-411b-93f5-4b8b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:18.000Z", "modified": "2018-03-13T13:36:18.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.118.252.138']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-e340-4c52-b9bc-4f06950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:18.000Z", "modified": "2018-03-13T13:36:18.000Z", "pattern": "[domain-name:value = 'www.nexiverifica.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1e44-426f-9cea-43a0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:19.000Z", "modified": "2018-03-13T13:36:19.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.118.72.110']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-a3f0-4814-8997-4ea4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:19.000Z", "modified": "2018-03-13T13:36:19.000Z", "pattern": "[domain-name:value = 'www.njsjdnasbdwdd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-fab0-4ed5-b934-42b8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:20.000Z", "modified": "2018-03-13T13:36:20.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.118.93.204']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-6888-483f-a659-4880950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:20.000Z", "modified": "2018-03-13T13:36:20.000Z", "pattern": "[domain-name:value = 'www.okljulihyjhg.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f080-4bef-aada-40c5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:20.000Z", "modified": "2018-03-13T13:36:20.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.119.19.244']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-0548-41ef-93f1-4970950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:21.000Z", "modified": "2018-03-13T13:36:21.000Z", "pattern": "[domain-name:value = 'www.oooweqwnenwqew.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d9d0-42c3-bd8a-410b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:21.000Z", "modified": "2018-03-13T13:36:21.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.119.238.211']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-7a94-4981-8fed-4a39950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:22.000Z", "modified": "2018-03-13T13:36:22.000Z", "pattern": "[domain-name:value = 'www.paysell.bz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d0cc-4dbb-9899-4128950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:22.000Z", "modified": "2018-03-13T13:36:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.119.2.55']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1e5c-4466-85bf-4d1c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:22.000Z", "modified": "2018-03-13T13:36:22.000Z", "pattern": "[domain-name:value = 'www.paysell.ws']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c570-43dd-bdbb-47ea950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:23.000Z", "modified": "2018-03-13T13:36:23.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.119.29.130']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-b0f4-4f9a-b002-4655950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:23.000Z", "modified": "2018-03-13T13:36:23.000Z", "pattern": "[domain-name:value = 'www.pomvgrnqqeetree.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b2a8-4180-9561-455d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:24.000Z", "modified": "2018-03-13T13:36:24.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.119.37.226']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-17cc-447d-9e56-47fc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:24.000Z", "modified": "2018-03-13T13:36:24.000Z", "pattern": "[domain-name:value = 'www.pqwoemnzbtwv.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-867c-48f3-a474-49fc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:24.000Z", "modified": "2018-03-13T13:36:24.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.121.73.1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-92f4-47b0-8c94-4a80950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:25.000Z", "modified": "2018-03-13T13:36:25.000Z", "pattern": "[domain-name:value = 'www.prvtzone.biz']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8098-467c-bcef-405a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:25.000Z", "modified": "2018-03-13T13:36:25.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.122.48.78']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-fa94-4368-af2b-45df950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:25.000Z", "modified": "2018-03-13T13:36:25.000Z", "pattern": "[domain-name:value = 'www.qojgnzogfezdniqbw.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5534-4e2a-8560-4d28950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:26.000Z", "modified": "2018-03-13T13:36:26.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.122.51.228']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-7df0-40e1-bb47-4eaa950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:26.000Z", "modified": "2018-03-13T13:36:26.000Z", "pattern": "[domain-name:value = 'www.qpweouplmmojdaiq.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5ef0-435d-9379-44ff950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:27.000Z", "modified": "2018-03-13T13:36:27.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.126.171.98']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-ee8c-4ae9-a3e7-46b4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:27.000Z", "modified": "2018-03-13T13:36:27.000Z", "pattern": "[domain-name:value = 'www.qwokqweijzxcsqwsxc.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5b64-471e-8ab8-4377950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:27.000Z", "modified": "2018-03-13T13:36:27.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.126.172.127']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-7184-421b-be01-4f88950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:28.000Z", "modified": "2018-03-13T13:36:28.000Z", "pattern": "[domain-name:value = 'www.qwozijnbqbqqeybnbq.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-3b54-4e94-8419-4b5f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:28.000Z", "modified": "2018-03-13T13:36:28.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.134.186.205']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-c8bc-4b5c-a69d-4e91950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:29.000Z", "modified": "2018-03-13T13:36:29.000Z", "pattern": "[domain-name:value = 'www.royaldumps.cc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1568-487d-aa1d-4ec3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:29.000Z", "modified": "2018-03-13T13:36:29.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.185.201.203']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-2378-469e-80ad-4bc6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:29.000Z", "modified": "2018-03-13T13:36:29.000Z", "pattern": "[domain-name:value = 'www.rtwjeuqwdyhqwdqwidjgha.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f1d4-4ba3-b6bc-4748950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:30.000Z", "modified": "2018-03-13T13:36:30.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.185.36.246']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-b548-4c17-b90a-4049950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:30.000Z", "modified": "2018-03-13T13:36:30.000Z", "pattern": "[domain-name:value = 'www.scottfranch.org']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d5ac-4e85-bc17-416a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:31.000Z", "modified": "2018-03-13T13:36:31.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.185.40.67']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-1068-4cc8-b1ce-487e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:31.000Z", "modified": "2018-03-13T13:36:31.000Z", "pattern": "[domain-name:value = 'www.silksaajjha.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d158-46f3-a676-426d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:31.000Z", "modified": "2018-03-13T13:36:31.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.185.9.220']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-8de8-4262-954d-4703950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:32.000Z", "modified": "2018-03-13T13:36:32.000Z", "pattern": "[domain-name:value = 'www.sukiebanieotbitesotnas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5388-4fef-8bad-49ac950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:32.000Z", "modified": "2018-03-13T13:36:32.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.187.179.186']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-0910-454b-a346-4442950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:32.000Z", "modified": "2018-03-13T13:36:32.000Z", "pattern": "[domain-name:value = 'www.thatderivativeworks.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b038-4852-a2de-440d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:33.000Z", "modified": "2018-03-13T13:36:33.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.191.123.186']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-8dfc-4185-98db-4ebe950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:33.000Z", "modified": "2018-03-13T13:36:33.000Z", "pattern": "[domain-name:value = 'www.theandwithinfareth.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0ce8-4399-96a0-429d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:34.000Z", "modified": "2018-03-13T13:36:34.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.191.126.31']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-0f64-4647-bca5-469e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:34.000Z", "modified": "2018-03-13T13:36:34.000Z", "pattern": "[domain-name:value = 'www.thedistributedderiv.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5d18-4692-88cb-4cb9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:34.000Z", "modified": "2018-03-13T13:36:34.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.191.134.112']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-6f98-4720-8ac9-486b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:35.000Z", "modified": "2018-03-13T13:36:35.000Z", "pattern": "[domain-name:value = 'www.tranasportnmme.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e45c-4ddf-9220-445a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:35.000Z", "modified": "2018-03-13T13:36:35.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.238.111.206']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-f038-48af-9493-4b1e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:35.000Z", "modified": "2018-03-13T13:36:35.000Z", "pattern": "[domain-name:value = 'www.try2swipe.org']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-63d0-4b46-bfb9-40a9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:36.000Z", "modified": "2018-03-13T13:36:36.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.80.165.93']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-470c-48f7-98d0-4c32950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:36.000Z", "modified": "2018-03-13T13:36:36.000Z", "pattern": "[domain-name:value = 'www.try2swipe.ws']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e024-453c-bb8a-4ed7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:37.000Z", "modified": "2018-03-13T13:36:37.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.82.28.34']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-c5b8-450f-a716-4b74950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:37.000Z", "modified": "2018-03-13T13:36:37.000Z", "pattern": "[domain-name:value = 'www.unclesam.tw']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5c14-43a5-b57c-4964950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:37.000Z", "modified": "2018-03-13T13:36:37.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.98.187.85']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-277c-44fc-885f-4116950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:38.000Z", "modified": "2018-03-13T13:36:38.000Z", "pattern": "[domain-name:value = 'www.unclesam.ws']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a7f8-4645-baf5-46e8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:38.000Z", "modified": "2018-03-13T13:36:38.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.99.221.229']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-829c-4cea-9070-45a3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:39.000Z", "modified": "2018-03-13T13:36:39.000Z", "pattern": "[domain-name:value = 'www.verified.vc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1894-4353-aa45-4998950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:39.000Z", "modified": "2018-03-13T13:36:39.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.12.175.59']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-e780-4a6c-91bf-4224950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:39.000Z", "modified": "2018-03-13T13:36:39.000Z", "pattern": "[domain-name:value = 'www.vnxirmdjasadadasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6284-4954-837f-491d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:40.000Z", "modified": "2018-03-13T13:36:40.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.16.13.42']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-4f84-4438-aa81-4789950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:40.000Z", "modified": "2018-03-13T13:36:40.000Z", "pattern": "[domain-name:value = 'www.weshelgoaouyntwany.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9a18-4e39-ae00-4bb9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:41.000Z", "modified": "2018-03-13T13:36:41.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.180.117.175']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-efc8-4de8-aa73-448c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:41.000Z", "modified": "2018-03-13T13:36:41.000Z", "pattern": "[domain-name:value = 'yidunaxyi.top']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6298-46fb-a6f9-4ca9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:41.000Z", "modified": "2018-03-13T13:36:41.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.182.29.38']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b781-6ce4-47de-8c6b-4aab950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:42.000Z", "modified": "2018-03-13T13:36:42.000Z", "pattern": "[domain-name:value = 'zavodchikshop.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ba98-460a-bede-4551950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:42.000Z", "modified": "2018-03-13T13:36:42.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.183.229.39']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2bfc-4f5d-abda-4533950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:43.000Z", "modified": "2018-03-13T13:36:43.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.192.225.36']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b408-4e7b-ad48-4e0c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:43.000Z", "modified": "2018-03-13T13:36:43.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.198.24.9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2bac-4f53-b060-4fc6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:43.000Z", "modified": "2018-03-13T13:36:43.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.214.129.181']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ba5c-47c4-bd14-4df8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:44.000Z", "modified": "2018-03-13T13:36:44.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.114.65.50']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2c88-4909-bd88-43b7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:44.000Z", "modified": "2018-03-13T13:36:44.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.114.68.102']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-91d0-4b33-a459-4555950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:44.000Z", "modified": "2018-03-13T13:36:44.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.139.154.237']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f330-4937-a015-4f3a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:45.000Z", "modified": "2018-03-13T13:36:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.208.161.228']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6368-4d1a-aac4-4acf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:45.000Z", "modified": "2018-03-13T13:36:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.76.104.146']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ec3c-486c-9b23-4aac950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:46.000Z", "modified": "2018-03-13T13:36:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.76.166.4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-411c-430b-b382-460a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:46.000Z", "modified": "2018-03-13T13:36:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.76.238.254']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ad08-4d70-9f1e-44d3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:46.000Z", "modified": "2018-03-13T13:36:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.77.200.208']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1f34-4b0d-8ed9-4766950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:47.000Z", "modified": "2018-03-13T13:36:47.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.77.53.5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8350-4fe3-bb0d-4c85950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:47.000Z", "modified": "2018-03-13T13:36:47.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.77.99.203']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-df9c-4258-9de8-4ea1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:48.000Z", "modified": "2018-03-13T13:36:48.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.78.231.22']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4868-4df0-ba3a-4cc7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:48.000Z", "modified": "2018-03-13T13:36:48.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.78.98.152']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d524-4b5f-92da-4467950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:49.000Z", "modified": "2018-03-13T13:36:49.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.79.217.89']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4a0c-46d5-991b-4fb5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:49.000Z", "modified": "2018-03-13T13:36:49.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '83.103.155.117']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-aef0-479b-bd38-423e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:49.000Z", "modified": "2018-03-13T13:36:49.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '83.184.239.149']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1d98-4e3c-8003-431f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:50.000Z", "modified": "2018-03-13T13:36:50.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '83.255.177.54']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8664-4fee-8ba9-4adf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:50.000Z", "modified": "2018-03-13T13:36:50.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.0.189.15']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e24c-4a2f-955c-46c0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:51.000Z", "modified": "2018-03-13T13:36:51.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.2.100.160']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5cac-4ce6-9bc6-402b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:51.000Z", "modified": "2018-03-13T13:36:51.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.224.128.251']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-cc1c-48da-a6ba-4bf1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:51.000Z", "modified": "2018-03-13T13:36:51.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.224.79.1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2b88-42d4-a029-4a6a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:52.000Z", "modified": "2018-03-13T13:36:52.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.232.236.214']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a138-4036-8592-477e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:52.000Z", "modified": "2018-03-13T13:36:52.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.232.240.210']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-efd8-4b32-9106-425d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:53.000Z", "modified": "2018-03-13T13:36:53.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.255.244.213']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-30cc-4d95-a17e-4d10950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:53.000Z", "modified": "2018-03-13T13:36:53.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.2.61.102']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e0b0-418b-915c-405a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:53.000Z", "modified": "2018-03-13T13:36:53.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.54.160.150']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-52dc-45a9-8662-47d0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:54.000Z", "modified": "2018-03-13T13:36:54.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.54.187.24']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ad34-4f77-9c05-4a96950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:54.000Z", "modified": "2018-03-13T13:36:54.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.105.136.98']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1538-4451-834a-4164950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:55.000Z", "modified": "2018-03-13T13:36:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.105.167.110']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8b4c-42c1-99dd-4cf7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:55.000Z", "modified": "2018-03-13T13:36:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.105.40.76']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-efcc-45d1-87d1-4883950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:55.000Z", "modified": "2018-03-13T13:36:55.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.122.4.26']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4574-41a2-b843-493f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:56.000Z", "modified": "2018-03-13T13:36:56.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.122.4.34']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-97fc-4e40-8802-4b4e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:56.000Z", "modified": "2018-03-13T13:36:56.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.186.132.136']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-da80-4112-bdaf-496b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:57.000Z", "modified": "2018-03-13T13:36:57.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.187.46.16']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-272c-4d6a-99ed-4fa8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:57.000Z", "modified": "2018-03-13T13:36:57.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.187.48.16']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7f90-4c7b-ac55-4b56950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:57.000Z", "modified": "2018-03-13T13:36:57.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.196.145.46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e348-4d6d-819b-4e56950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:58.000Z", "modified": "2018-03-13T13:36:58.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.204.62.71']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4c78-4855-86bd-4dfe950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:58.000Z", "modified": "2018-03-13T13:36:58.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.206.221.28']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ad74-4c3a-8f1e-495e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:59.000Z", "modified": "2018-03-13T13:36:59.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.101.230.109']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e3dc-4071-8f58-4a73950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:59.000Z", "modified": "2018-03-13T13:36:59.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.101.99.100']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-3858-422d-bd6e-415c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:36:59.000Z", "modified": "2018-03-13T13:36:59.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.104.75.4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:36:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b574-4a53-9f44-4dcb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:00.000Z", "modified": "2018-03-13T13:37:00.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.106.200.105']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-fe9c-46cd-a8c3-4444950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:00.000Z", "modified": "2018-03-13T13:37:00.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.107.101.21']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6ce0-4f63-8066-498d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:01.000Z", "modified": "2018-03-13T13:37:01.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.120.13.153']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e09c-4f0e-8084-4c9e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:01.000Z", "modified": "2018-03-13T13:37:01.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.120.14.155']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-13e4-4fe4-88bd-4650950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:01.000Z", "modified": "2018-03-13T13:37:01.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.120.168.154']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5348-460a-af1f-4f42950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:02.000Z", "modified": "2018-03-13T13:37:02.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.120.77.221']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b0c0-44ab-b4b1-4502950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:02.000Z", "modified": "2018-03-13T13:37:02.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.0.5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-06cc-43d0-a2fa-4174950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:03.000Z", "modified": "2018-03-13T13:37:03.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.13.229']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5ecc-4193-bee1-4c48950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:03.000Z", "modified": "2018-03-13T13:37:03.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.174.165']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c090-4e22-814c-4038950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:03.000Z", "modified": "2018-03-13T13:37:03.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.186.143']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1638-4aae-bf8b-4995950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:04.000Z", "modified": "2018-03-13T13:37:04.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.20.39']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6794-4382-a1aa-41ca950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:04.000Z", "modified": "2018-03-13T13:37:04.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.4.37']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c37c-4227-a755-4ed8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:04.000Z", "modified": "2018-03-13T13:37:04.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.122.123.246']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1ab4-4bbf-9f9d-40c0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:05.000Z", "modified": "2018-03-13T13:37:05.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.122.138.252']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-8448-4dcc-b6e1-4476950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:05.000Z", "modified": "2018-03-13T13:37:05.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.124.188.212']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e030-42a2-878a-4bcb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:06.000Z", "modified": "2018-03-13T13:37:06.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.124.199.122']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-51f8-44d2-bbb2-4d11950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:06.000Z", "modified": "2018-03-13T13:37:06.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.124.61.73']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bcb8-4ec9-a197-4b54950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:06.000Z", "modified": "2018-03-13T13:37:06.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.125.235.29']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-42d0-4a24-b025-49d1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:07.000Z", "modified": "2018-03-13T13:37:07.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.126.122.155']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b0b0-4af0-994a-4264950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:07.000Z", "modified": "2018-03-13T13:37:07.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.126.136.160']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-165c-4e80-aba2-4af2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:08.000Z", "modified": "2018-03-13T13:37:08.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.126.98.134']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-48dc-4952-9ae3-4e9c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:08.000Z", "modified": "2018-03-13T13:37:08.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.127.189.40']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-83f4-4bee-90ba-4b51950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:08.000Z", "modified": "2018-03-13T13:37:08.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.61.72.96']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c998-4445-b7bf-489a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:09.000Z", "modified": "2018-03-13T13:37:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.116.79.183']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0ed8-4fe1-b724-477d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:09.000Z", "modified": "2018-03-13T13:37:09.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.119.100.220']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-41bc-45ac-ad23-4786950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:10.000Z", "modified": "2018-03-13T13:37:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.120.51.58']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-60b4-4833-b7b8-42e7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:10.000Z", "modified": "2018-03-13T13:37:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.121.163.217']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a658-408c-a179-4f17950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:10.000Z", "modified": "2018-03-13T13:37:10.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.121.172.134']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0628-449a-8771-49be950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:11.000Z", "modified": "2018-03-13T13:37:11.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.248.65.249']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6ef4-4d20-bbe6-47ed950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:11.000Z", "modified": "2018-03-13T13:37:11.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.97.233.173']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f890-4dd1-a950-4ac9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:12.000Z", "modified": "2018-03-13T13:37:12.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.97.240.199']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6738-415f-b93e-43f7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:12.000Z", "modified": "2018-03-13T13:37:12.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.97.250.231']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d194-4485-94a5-4d9e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:12.000Z", "modified": "2018-03-13T13:37:12.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.201.27.209']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1738-43a3-8a37-406d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:13.000Z", "modified": "2018-03-13T13:37:13.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.203.215.122']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6574-4389-8986-4eb2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:13.000Z", "modified": "2018-03-13T13:37:13.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.85.104.188']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b2e8-450a-a5e2-4ba9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:14.000Z", "modified": "2018-03-13T13:37:14.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.133.197.60']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-df8c-499d-8245-4088950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:14.000Z", "modified": "2018-03-13T13:37:14.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.133.234.3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-14c8-4a3d-8025-4556950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:14.000Z", "modified": "2018-03-13T13:37:14.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.133.235.220']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-493c-4e1a-aa90-451e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:15.000Z", "modified": "2018-03-13T13:37:15.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.136.133.219']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7838-485c-87b1-49d3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:15.000Z", "modified": "2018-03-13T13:37:15.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.136.145.11']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ab80-4bd4-ab08-404a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:15.000Z", "modified": "2018-03-13T13:37:15.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.137.155.23']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-dff4-4c58-b363-4075950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:16.000Z", "modified": "2018-03-13T13:37:16.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.137.216.179']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1c38-4286-9e94-42d9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:16.000Z", "modified": "2018-03-13T13:37:16.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.17.225.163']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-843c-490e-98e8-4cec950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:17.000Z", "modified": "2018-03-13T13:37:17.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.176.122.31']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c4cc-4e5f-809f-499e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:17.000Z", "modified": "2018-03-13T13:37:17.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.190.74.198']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-33d8-4567-bfd6-4cc6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:17.000Z", "modified": "2018-03-13T13:37:17.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.215.156.62']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bcac-4964-9e64-46b6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:18.000Z", "modified": "2018-03-13T13:37:18.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.215.173.163']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5714-45db-8816-4c79950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:18.000Z", "modified": "2018-03-13T13:37:18.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.232.36.2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f244-45da-8e9c-49b7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:19.000Z", "modified": "2018-03-13T13:37:19.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.238.207.5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4aa8-4b56-ba2c-418c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:19.000Z", "modified": "2018-03-13T13:37:19.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.253.160.219']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bd9c-4337-953c-4d1a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:19.000Z", "modified": "2018-03-13T13:37:19.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.44.244.88']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-28c0-4cd3-b965-48f5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:20.000Z", "modified": "2018-03-13T13:37:20.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.45.19.18']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9bb4-44d8-8312-45a9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:20.000Z", "modified": "2018-03-13T13:37:20.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.45.19.26']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-028c-417d-8c10-4a52950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:20.000Z", "modified": "2018-03-13T13:37:20.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.46.25.58']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6770-44bc-8fc1-468d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:21.000Z", "modified": "2018-03-13T13:37:21.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.47.94.113']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-e5b8-4721-acfa-4236950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:21.000Z", "modified": "2018-03-13T13:37:21.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.141.227.102']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5140-4f76-9d6e-4bd8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:22.000Z", "modified": "2018-03-13T13:37:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.144.250.165']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b5c0-46d4-bd31-4949950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:22.000Z", "modified": "2018-03-13T13:37:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.148.230.87']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-3408-4298-a6f2-4099950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:22.000Z", "modified": "2018-03-13T13:37:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.154.142.173']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9824-416c-a62f-494b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:23.000Z", "modified": "2018-03-13T13:37:23.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.154.221.90']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-06cc-4724-96d9-4b09950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:23.000Z", "modified": "2018-03-13T13:37:23.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.177.80.171']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6ed0-4a99-bfd7-4bac950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:24.000Z", "modified": "2018-03-13T13:37:24.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.180.1.23']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b668-4574-bfdb-4bc2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:24.000Z", "modified": "2018-03-13T13:37:24.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.228.198.7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0760-40ea-a39b-476e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:24.000Z", "modified": "2018-03-13T13:37:24.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.230.88.30']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-608c-460a-933e-4f1b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:25.000Z", "modified": "2018-03-13T13:37:25.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.139.147.93']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a824-436a-91f2-482c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:25.000Z", "modified": "2018-03-13T13:37:25.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.139.175.76']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1410-447b-bfdb-4579950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:26.000Z", "modified": "2018-03-13T13:37:26.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.139.190.217']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-63dc-4021-81a1-4cce950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:26.000Z", "modified": "2018-03-13T13:37:26.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.139.196.113']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9c38-4f2c-87e8-4b60950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:26.000Z", "modified": "2018-03-13T13:37:26.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.139.200.135']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c6e8-47e3-a82b-4569950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:27.000Z", "modified": "2018-03-13T13:37:27.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.187.102.198']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1a38-4c26-bbf6-4107950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:27.000Z", "modified": "2018-03-13T13:37:27.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.196.8.41']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7044-4cba-ad57-496f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:28.000Z", "modified": "2018-03-13T13:37:28.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.201.175.46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c77c-48a5-a390-460a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:28.000Z", "modified": "2018-03-13T13:37:28.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.83.171.131']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-18d8-47a6-9fee-460f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:28.000Z", "modified": "2018-03-13T13:37:28.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.114.91.163']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-78a8-4dd2-a8e3-44ed950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:29.000Z", "modified": "2018-03-13T13:37:29.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.247.143.70']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-bbf4-4e9c-b783-42c8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:29.000Z", "modified": "2018-03-13T13:37:29.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.247.149.150']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ded4-4ac4-8bbe-4896950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:30.000Z", "modified": "2018-03-13T13:37:30.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.249.248.25']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-f46c-4225-9f90-499d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:30.000Z", "modified": "2018-03-13T13:37:30.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.52.201.19']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-4dfc-4178-80d2-4dc5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:30.000Z", "modified": "2018-03-13T13:37:30.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.55.66.212']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c21c-443a-bea8-4ffb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:31.000Z", "modified": "2018-03-13T13:37:31.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.55.95.123']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0c70-4a24-a705-4adb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:31.000Z", "modified": "2018-03-13T13:37:31.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.81.118.230']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5980-40ff-985e-4644950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:31.000Z", "modified": "2018-03-13T13:37:31.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.103.166.70']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ae60-4521-b27b-4650950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:32.000Z", "modified": "2018-03-13T13:37:32.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.114.137.237']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-ccf4-413d-9a54-43b0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:32.000Z", "modified": "2018-03-13T13:37:32.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.114.141.183']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-2df0-4dda-9ec7-45a8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:33.000Z", "modified": "2018-03-13T13:37:33.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.114.82.80']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-920c-4f49-8be9-4ef1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:33.000Z", "modified": "2018-03-13T13:37:33.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.118.206.238']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-fa74-4f3f-891d-4ba5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:33.000Z", "modified": "2018-03-13T13:37:33.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.140.77.202']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7ab0-45e3-9001-4124950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:34.000Z", "modified": "2018-03-13T13:37:34.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.152.165.187']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-d184-4d27-b0d5-4352950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:34.000Z", "modified": "2018-03-13T13:37:34.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.152.213.129']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-30f0-4e47-9dca-4468950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:35.000Z", "modified": "2018-03-13T13:37:35.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.190.144.113']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-82b0-4157-9b6a-419b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:35.000Z", "modified": "2018-03-13T13:37:35.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.155.67.156']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-b33c-4490-9d3f-49f7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:35.000Z", "modified": "2018-03-13T13:37:35.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.156.156.88']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0f88-449d-9046-4556950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:36.000Z", "modified": "2018-03-13T13:37:36.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.190.179.160']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-6850-4f09-9814-4c19950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:36.000Z", "modified": "2018-03-13T13:37:36.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.190.187.35']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c8e8-4c3f-8d37-4404950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:37.000Z", "modified": "2018-03-13T13:37:37.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.240.222.57']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1788-4cba-b5b6-48a7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:37.000Z", "modified": "2018-03-13T13:37:37.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.248.185.198']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-52a0-42f5-a575-4342950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:37.000Z", "modified": "2018-03-13T13:37:37.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.248.186.242']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-a1a4-4061-b6c1-4001950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:38.000Z", "modified": "2018-03-13T13:37:38.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.30.173.178']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0c00-4fd0-9d78-481d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:38.000Z", "modified": "2018-03-13T13:37:38.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.52.3.239']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-526c-42e9-9a30-43cb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:38.000Z", "modified": "2018-03-13T13:37:38.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.52.98.240']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c3d0-4241-99d9-40e3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:39.000Z", "modified": "2018-03-13T13:37:39.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.104.121.111']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-1978-462e-89be-4991950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:39.000Z", "modified": "2018-03-13T13:37:39.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.111.66.122']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-75c4-43fc-b6dc-4312950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:40.000Z", "modified": "2018-03-13T13:37:40.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.111.89.26']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-c978-45ea-b917-4c8b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:40.000Z", "modified": "2018-03-13T13:37:40.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.140.195.178']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0cc4-4f58-a571-4b66950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:40.000Z", "modified": "2018-03-13T13:37:40.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.158.162.200']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-5330-433a-809d-4cbd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:41.000Z", "modified": "2018-03-13T13:37:41.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.168.60.247']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7f0c-4046-b2af-43b9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:41.000Z", "modified": "2018-03-13T13:37:41.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.170.220.66']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9ff8-496e-8c4e-4cee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:42.000Z", "modified": "2018-03-13T13:37:42.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.218.137.178']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-0478-44a9-b00e-48a7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:42.000Z", "modified": "2018-03-13T13:37:42.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.218.187.170']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-7190-4de0-b7db-4a3f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:42.000Z", "modified": "2018-03-13T13:37:42.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.42.141.107']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79b-9ca4-48d9-8af5-4b26950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:43.000Z", "modified": "2018-03-13T13:37:43.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.43.11.180']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79c-0c9c-451d-8b8c-4ca5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:43.000Z", "modified": "2018-03-13T13:37:43.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.65.55.191']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79c-3e54-4cbb-bd9b-42b3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:43.000Z", "modified": "2018-03-13T13:37:43.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.65.95.105']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79c-95f0-456c-b801-400c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:44.000Z", "modified": "2018-03-13T13:37:44.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.68.55.82']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79c-deb4-4836-941e-465f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:44.000Z", "modified": "2018-03-13T13:37:44.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.76.132.131']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79c-5dc4-42c4-93fc-416f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:45.000Z", "modified": "2018-03-13T13:37:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.76.133.24']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79c-c62c-485a-83be-4943950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:45.000Z", "modified": "2018-03-13T13:37:45.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.76.175.134']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79c-3790-44d2-8484-4057950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:46.000Z", "modified": "2018-03-13T13:37:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.77.15.228']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b79c-6df8-4055-88ad-45ee950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:46.000Z", "modified": "2018-03-13T13:37:46.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.87.213.225']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-2458-41f1-a93d-452a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '00e3bcfd0ef917c73c5a3818daf5bc0271fb3da53817df1215c20bfa5e4e91da']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-6200-46b8-9fed-4685950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '01b3d5de0e7c80516811276c31c2ba5d10020f04a7f7be5517c0fb2f452b8fcc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-80cc-4aec-89a3-48ff950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '0390956e3c62dad776147b6661fc5dbcd8d585027f7fd530e7b0428007b43197']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-7694-4386-807a-4751950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '041ad28cf8a6c03953910ea6dec3987ffd4daf729cce2a87e9bf68c480c0918e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-98a4-4465-8d20-4d23950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '04a320fac7e255e0cc08635abae96241944d9f0ecd0d57953447c7616ad9fbe8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-48a4-4eb1-b189-4630950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '04b7d38fa77396c75adfbb91e7efc725e97bbe673f575b42862031c1039dbdd2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e4b8-4d8a-b177-47da950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '07b4420172aded36c50bc312fbb22779ee8f166a28b0ae6a2e38fdcde8e37317']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-0f84-4900-9e64-4f43950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '0871d285f67c78a38e6713aeb7b1d76f8777d1d3a5479ed81e543ebcca54a1fe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-5054-4c77-9282-46d7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '0b2428609aabb06f4379d5cd50e696147f824f4c7724e826064abe9368f5c76d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e520-48c3-8533-4949950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '112a5ebecf43d35c9e196e49dedd8c7763bc8d05b175383303f7ae81b3e90a16']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-43e0-4fda-989d-4e05950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '1252053029722400e9f8115ad0b33235c642fbc7bbb96cf0c0d02c51d3426ae0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e0bc-4e77-8ac2-452e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '14284152d53c119ad04c986a2a115485ae480d8012603679bf28ec27e3869929']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-cce4-4ca9-bb12-40cf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '15ab4446504c9510fe377fb8657f9b4b67935c2aedd725058c1a15bf446a4015']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-8e14-474d-aa40-4409950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '15cc66021a04a4667e58ca9a7c8b9382dac1dd5869c788ceae47642454472b3f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-42c4-4936-9679-47b2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '1770d63f6ca452aa3afe77690c956fbbb0d5ae186fc82c0d14730820f9b7bb6c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-2e88-47be-a987-4764950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '18a10852b14df97b69243b38b23a573cc89d7629115ee0fefbbd66a00078ea4f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-1b14-4f77-bf18-4880950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '19212bfe27243227b15d7fb9e454d2c624e5d6cf847b8750a4a9b5ad55aec14d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-ce34-4b37-ac9f-4c65950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '194845f61ff81aa9000b3df9f0513b737941c1eac444b5457bcb9a0f772f8b34']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-6e94-41a8-8d09-477c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '19699d486840e392aa9b9630ab5df16233cca09230d7da30b60bb60cf973150c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-c908-47bd-97ce-44b5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '1c41511f967771ab8fbd4c96a857637efbb88b4d86d180c7bbd31fc748890d27']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-7990-4354-869d-4b48950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '1c980aba3c079b000d2a3c3431aaae37a34949d40c6e4d41721d06b53983d6d5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-4e90-4969-908f-43f6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '1fe5990f49535a312c2067188aad878933a778a7d4d7d4724d08a5637a72b9d0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-637c-44b8-b741-422a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '238ea3cc12020ad483279d363de6755d96a1fb2347b7d1815bb581514f2e9d9e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e860-40e5-b4b4-4980950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '23b4a46ddb5f904cd8c0a8b8eebfc623380a587a53c79469fd24b1724401fa0f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-71f4-470b-b0cf-43d1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '241658e90abf3416d97bfeff1e194d03d3103a7b07670b56420b4b4b61308b84']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-3f80-4eda-8b44-4f4c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '243b07e5f9880d126932a65ec2db49adef323b87a36ff91e6d2f811add6601d9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-c870-4ff8-8d3f-4efe950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '24829d1c8611a0ac01fc8139fbda91f52e76da46b9219044f70917c03b186be6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e400-4b2b-9a3a-47b3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '24d67b732f5d7ef320f1ab4a301fa9bf610dd9a831926f0cde8d4bae1c286700']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-ce18-4cca-9953-4d99950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '258513db7949cd16330a90b2d46925768631bb54769c8d43dcfe3bf0b2617ab1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-7478-4269-aca3-4ed0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '272c9c24b43e879d75da6c9b308510c80ce989101e5fd221843d6e35ce442191']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-1410-4870-942d-4441950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '275136e4983e309d584ec088ee369634b3761fef163a8e6cce709699775d9ac9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-b218-4b2f-993f-4aca950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '286011ba8c7e9f16b219d3919eeaa625391446525fab30d7adb532957003304a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-32d4-478a-95c8-4e75950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '2b4b4ead7f8a7b11e126d8c6a4199163e8debe33ea3a0b86bba78f92a6ee1740']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-d208-4096-bbf2-4e8e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '2f10286e313d0131b6a15d943ab91f0398287159f200f1c4774a095dfb979ff8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-3064-4b26-8370-4f60950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '30459539ca6f322c7f8a395092211df50361e834c5da0e3734c62eacf69afaad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-7818-4202-aac3-431c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '31ab3210c37c18a594478fcf466a7d9438d44155e4a6d0ff06e2df1f9496384c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-b734-4958-8d65-491f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '3342a7b78e6e3cd56c7abd51e1c66f94cf37fd5ec8fc7eef2c8905b00f96d69c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-a978-4c59-b92c-40fb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '36ded192ad393efe6ede239ec44f3f92457ff3647a1c3f87eabc859db52c9575']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-d078-4459-854b-4076950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '379c6ededb129c04d6cb3feb76bae8f403e12c2309cc0b26514ced95e154be0d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-fdb8-4c15-9f62-46d8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '38a80f5c92fa7444b757f8cba214ab7db7b4a57a38a432f56a0aaba7e80c692c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-2fa8-4d0a-8faf-4bac950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '39fb5a2659b013894366ae3620a74ff5eb381e39c15ea76d148a93a9b43a5aeb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-2d00-433d-8912-4f16950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '3b48246dc4b173a48a8fc04fcd4809fae45b8c73b0d33caa7052ef4b327fcbec']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-8e7c-4055-9ac3-4ccc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '3d7b183262dc42e6efd8d0c30bc6528c8f3847cb6b6c633b211e18fe4a9723eb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e3dc-4ca1-8e7b-4997950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '3e0c7e9f5acd8022624325492ab52fbe9df08f03cba21f137d5feb12185a2a3b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e774-4704-8be7-4e92950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '3e170b6d3f4ae8a2a101dfdf1e7a0947e715992256c16087f43d268b2de7cece']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-ec38-4b24-8f42-4d1b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '3e6b779c02e528436709c1873f5282453326c2f6ef1b9c4e1f6ff8f868728d80']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-f160-49b2-94df-48b9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '4348b3da8a0a9df56a6a218f8ece0b313a04eb85446c58a2d5d0061baa5754f9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-0e5c-4eee-8616-49da950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '437f7e76026b069fd1a25f633f250418792c77e94f77cc2bb7b6d03b897b17b0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e4a4-4d3e-aa89-44d7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '47d573c96a36966d4074d77855d64cdf8b977e6cae63c232cc477e622c60adec']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-b128-4200-b1f2-4343950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '4cb074da79840e68901060afb79029b8eedd2ea6c803eb0c44dd46bad2cd4b45']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-8770-42d0-92e7-4b1b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '4d9ea1cb63d187e1cddf0085a80944903e9e020f54cbeed5674b304ed4c664a7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-519c-4368-b51e-4ef4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '4e6d9c92c20174b07a6582b5dcc862536fbdce1a5964340dc5b238b3885985d2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-2334-43c7-b708-4c42950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '4f3cfee867adf239e4637a845b991edd4e523aa525101875492273f913013a56']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e144-4952-85cf-463c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '50de5d472ca4336f21c1c54eddfac7da2dcb2b0062cb82bc23232af51488f48c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-86b8-41bb-859b-4866950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '528bcdce7e1fc467c414267d8ab1cd0022071bc4ca304d2cbb90446f2540d799']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-33fc-4662-af5a-43b8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '5328e6cc453209eea9a2dc41e0ef19516794a5cebf90c6094acc581b8fbfe966']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-1728-4bea-b816-4296950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '538da0b115ebfa2e0b8d80f0dcfaf464afeff8f7dacb8d2db0d5938473704f64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-bb70-4553-854c-436a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '56bfcdd6d4fa3414ddeaefedbae3d5c1914f2d183c69ffff70929dfee80a0d8e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-6530-45b2-acaa-4e20950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '5b78f940c8376754517bfab8ca6ec1ebf978e5d32deef002a1715b39646a3407']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-c2c4-486a-b144-4969950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '5d15801241768974654ef7f4bb2e5914a6fbf9b628421a237c64bd6031949a1a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-2120-4bf5-a3d3-478d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '5d902968cb85bfa17f280d8b4ab9757b650760638f39ed43301053f67b67c5fe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-7874-48f0-94d2-44d8950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '5dd05cc4deff26be3bce97a0814a1513080e1579021eea6771b2a9842050eb80']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-d540-4665-a892-45ac950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '620cf704d9930328729fd66be9c83f6db33088199a60a02315110bd757c13ef7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-3e28-4a55-aa7a-4b81950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '623d2a5e4bc341c96d7b1dbeaa448fe54616d1f2d62c51e46df3d066308fb904']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-9edc-48da-911e-4b09950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '62e3f58ec80fac52b6d1c12b17254c254b5113a70e8510df7b9bd49314aec00f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-d498-4c0e-a6c5-4182950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '644bab0b1aee8016d3c11a5112b80f7d9522203bbfb9b04218a13c95920aa185']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-70ac-43cb-91e6-4b53950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '659842f05b708a081d9f1e47317dcd1c5e4ffc09d00c3cb9a06de966ff429839']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-3114-46b3-a294-4523950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '67295af71bb23da8e045537784bd5af5ca7ad4aa742517a022022e9142e38a14']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e880-4668-8db6-4fb5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '6cf02af30b8a304b565da539a6222033a6240a33aba013105a44dd77e0508faf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-9fec-44da-a37a-44b7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '6e91eb5fbf5962ddd24011d73998d9c005779c32d8a763b57a5ffab0348a265f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-62ac-4ae7-8293-4fd2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '710439f33705307e2cde051bbdf446acfad8fd94a14be5c75b8350006b3a8d6a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-2ecc-4e0b-bd4c-4f06950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '71b283a465e11cc51c5e6c2358c146ee2263c79c602efd12433e7abcab5d8934']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-0af0-417d-8069-4f8c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '7210f0314f4814b28c2157e10d4ffdb10bd575dab6b93c90027820e16e2b109d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-071c-4698-b7b3-4aa0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '77482b48f56ef3a4132b52fb70432634b58ec165191fbcfbf9a0cbfbd1bccad5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-09ec-4ff5-a4ec-42b2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '7a2629e3505686c623cc001e684a95652b8ad7b8a8a697a106c116acdc25e421']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-7ef0-433e-8c5f-4e86950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '7aee0d6cba97a15b3b86b5be47b741dedc718fdcc6975a37875ce9de5db437fe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-af98-4b7a-a04c-4d93950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '7dc0eb78c2d5c8d7a07df541df4766620f68e28e06778c5a6ed70438c9f24499']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-0cc8-4119-b63f-4e32950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '7e0bea576dcde7384084a7e8754876a75ee3db4711c30d28585e157d9827b13d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-5be8-4b69-91e1-4eb9950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '7e10cc1030d10939aa05cbd498f74381e0770fa5418b574c42fa9628003d5fdd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-0030-4b96-8a3e-4945950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '7e1fa4807e9314f54b8c59d1fe9745412566b7c2d4fbcbef8078782d96f4e10b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-aa54-433e-aac3-400a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '80caab696b69df9b76ed44440e6d9a0ad360ba521f0229014986abb923f6019c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-87a4-42e8-9761-4f52950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '817daa9d76d0dc834cd63c905703412f3c749c91f4e79945427bc713a18cc5cb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-3998-46cc-8648-4d2c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '8205524c6b5b6a395c44585fb04e835fbcdff2b0a135b210dbb281a33feb39dd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-2818-4606-a33e-4c4e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '82b4da37d492b024b190fbbe30dc08b1d9b877f20fbce057ad1b1c0566421994']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-f9b0-4687-9d6f-476e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '836f470f458f72ffe7d9cb3de221ca9cacd2fccb1d209a3d11f30cf6304556ce']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-b1e4-4516-b653-41f2950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '86b826543a4e343cf2ecc8f8279b859aadf5034a25613d30eb13d8f4f1d8cd57']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-7da0-496f-8ace-4652950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '87fbf04b07fcbdd2f97f1f51d99abd19f1572f33f8253be8d79152c9b6d00aa7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-4254-4b6b-8e2a-453c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '88969b47fe1ad89b50f5bafa46ec769622e079ebf7a498a78f7077a87b2b90a7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-0960-4762-b74a-420f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '88ad17307f86b59c35f1c424cf785343ae93a58979ecbb063e6f44603675b918']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-3d68-44bf-9060-4bf1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '8935407185ddc8197b8cd84239faa2ab31e87178ec0c7ad0205a4bb6a8bca6f6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-69e0-40a4-8ad2-47c0950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '897b2f0c72cc89596f02d1d496578791677f61c4f1ef71aa2e784746479095bd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-8eec-40f9-af5e-4943950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '8af4c02a21385918fbab32079e38bd955dbfd9a3b5cd409668830053a14b07dc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-abc4-47f7-b16f-4e5a950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '8f29b3bc0ee8bdb00971576403db7854b3a59a8997fd7ccced8d23e834455d36']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-0c54-4075-9825-42ef950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '924b32b407b44c7ff6788004120cd85d410648a04cd6f5360db3e199e6c82a04']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-d234-44ab-992e-41d6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '92bf654e3cc50af479468180a3ee520bc13f979c9e50b18886cabcea09b1220e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-84f0-40db-a0ae-459b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '93107f3a350dc955a632a5011f7cb274b0ca9288c2106bf6c971bbb09c0ececc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-4bfc-4666-97b4-4712950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '932be9385b60b1b2f7d2e2861a9b568a291846ecf0227413417c99d2d16785c0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-1ec0-4f6b-94a5-4176950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '949e42af2d12099f743d9c83dccaa01885ecf9f3bc40a99a9a868a7dc3e7f367']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-d884-4d4f-9af0-407e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '9833daa8499feb9c7fb1c6422e64904712711eb579d5196e55296cbc5a7bbbe4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-51d4-4c45-a4fa-4371950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '9884d3287d3be69a0d06c6fd414d828b0036106580f212e39b6adbbddace2010']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-d998-468d-b58c-4691950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '9ad3cbe820b31d27dca4c28d56ba3654735e7d1d00b091167fb1a8d9ac0dd31c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-5a54-4415-b5bf-481d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '9b636ae57cc03448c09ba6501fd71a2885a947db2295365cfe1fb3df3900f72b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-eca4-4f85-a3e5-4858950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = '9cdd5a451b12b913bc48ae99877f3f3ae830e94fdc7a93bc919c8b31eb2dd8de']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-86c4-46bd-b10c-404f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'a130cd38f7de1d801a78f2c06a596a578ae3d75bf1b17d5d45fc1733c69f4268']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-1c34-43b6-aba1-4775950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'a3e2b07d7094473e7bcfedaf4e1df411f8c4e5113658332dfe1ca32f621ab33d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-a650-4f75-b83d-427d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'a4335d27b9ca8ab14154aff918034194a98a12eb25607e00613965bf053bcba6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-5e20-4ffc-97fd-42dc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'a6a8204b0fe9a34ec7c41a60a54a0d4af1d34d0bbda89c0828092a7a11226f0a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-1b68-4c3d-ae45-416e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'a78cde697ef1aa54eb3ad74dcc0f1a40b5aec3ef936e213e7fd38480e07e919c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-f4d0-4667-a502-4784950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'a95b7e80425bee413ac5a022bca996ad0cd2bd18ed5db7fbe6c0769c5399a163']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-b27c-4d7d-a2b5-4e19950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'aa96c4de7bc4edeb68bd03a6a5455139e389e4e40e154732ddce3255e2f7efe6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-4e90-49be-8189-49c7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'ab0ca8231c11d7f0aa9ac32e270b86eece17946a8fc12220788f9bec35b9f584']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-0e94-4c99-bbc1-49bb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'abacd28fa6ac67ecb85aa15ac26d48fc60c5d0f8a0301f0d1ea4421c69685c3b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-b980-4c71-b90d-455e950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'abf127380298bbfa143f58fe58b862808d7ca5f52e1c5daf67f917efd3372639']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-759c-4e38-9275-4754950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'acab9cc10a836c7b94613902e585867973984c10284a7cbabf046de205b4903e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-4284-4bdb-8a6e-46c1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'ad0f1d6393747a394353e830b3d0c89dd3cd8c4a8c1bab1064451cae5a4a1b36']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-06d4-45b0-a1a9-444f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'ae0014aa96e81d431c4c12e052b9dbb18c065eecef79f40d0f808c403e7399bc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-ec58-45dc-b7b5-4a96950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'ae9457c1f954f6c53914a46c15c906e542a01b830bbddd61fc64ca76e13e4d09']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-bfe4-42ff-a1e3-4104950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'af392fe93ca1e02fa5c12284dab4a3c3f8eda251c86be8b1c54b8d6486c91242']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-8560-498d-9a1f-4ebd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'b06eb80d956774cb2ef9a38ee6c2a5af34729f575c80ba6af4bf6e501497fc0c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-3b3c-4b36-897a-4bfc950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'b34964eff2f2c8f85c4ed710d0eab0e40c0268447a703bc277ee016e804c79b4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-f17c-4809-99d7-4377950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'b6b715982d7674f28e697ab896840d8dc596324351ab5aa21336c597d72d7500']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-2ff4-4df6-aa5e-4a3c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'b7475b1e27ee13d5ca7a59186fd6621bda2632910a2c4bf3117acf4e441b9b94']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-78f8-4581-a89e-49d1950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'b8b7b45988030666a9f63e7cfaba1a6d7dc5daff3e788a0afe5e375b55f982eb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-9aec-4349-8674-4bcd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'b9c1901743e8ca362a8efb77f1fb895e924c3e8abc5161f2bb44182a0c12523c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-d068-4eaa-83eb-4eea950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'bda7983c416f16c74a954c37fd71af2b95f2c3e7cf9f4746d16cbe206974dba9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-2bc8-4071-bdf1-4ddf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'c26dbbb1c5ee2c35561eebdd89f03be9e200da66ba31f63c1c074300c9277764']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-c1c0-40ed-b42e-46b3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'cdcd65ada6539ae4311ac2a7edb2db6b0235edaba56266033e0690a7280504f4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-ef6c-4d59-98ba-4383950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'ce316a440ed198eb286f01f6c18297f8207d7ee56c5fe0f415a2bb43558e4117']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-ca88-4b78-a814-43b5950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'cece67cd2b40b314c9ae10efa5468cc8c734a9d609f2b6df159fc87d56a55926']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-4b04-49c7-a187-4c81950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'cefb8008b9d77d635842c5cc141fb47243ab1c2ce42145e2c2cf27ff341ae3fc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-8210-4397-98d3-422c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'cf35ce413d812c79d61fb6e30aacb203ab23c253d7cbef28941f92923aaf6aea']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-eb1c-4100-8ff9-485b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'd13459e6a495ecac9e21b95354ad12c22203c9f7cf87390388ad15a9cd21b5f4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-4b90-4f1d-8cdb-46b4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'd2a74a18a10e03fa27fbd7f954befa11ae39688e9380cfa6ea5edc7c5f2fe02a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-5934-4478-8ea3-4092950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'd70c43fde7ab1dc8428a794e860c7aaa14c5a5c70747489bd3f2f16bcc8ea6d0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-bb9c-4b4e-9eb6-4078950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'dd58286c5ce17c1c18cd7c13aa61cdc97bd483a98e79c9ab474d6ff6f1ba1269']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-70d4-440a-af73-42fb950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'ddd0869bbe3586a18e728396fa3e77bdd794f4cf86584d92e0d6796d02672f68']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-9458-406f-bcfa-4ff6950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'de1499522ca82e52c9b05fc00254634191de681a19b80be5823bbf38df0f569f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-4c4c-4c59-9909-48ef950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'de56fa75b0a7774bdba6e58dd1a1cc06b6b2b40d96189716612a07f4817a8d28']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-26a0-484b-b5a5-43d7950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'de9b33b92113cbd0ec51b9e13596f5320d45bbb7b0222a6a17ed2867a2ff68bb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-76ec-4a28-ad8b-4831950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'de9bfa660708b04c9519c9ca7d36cd5c6b9dd5b448cc0ee01b0ca846ee381965']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e038-472d-86b5-461d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'e00b0692087d2739aea7a8b42b92fd6a09fdee29744a760d7553b002ff530550']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-a18c-4b84-be31-4648950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'e37bbf95ce83592f7c72d548842cb33be5d473bf1cb18dd9910edb9692fcf1b5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-fbe4-4b1a-a7cd-4637950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'e58a63d24e82bf00fc092c56e6ee75f0e3f0318dc0dbc6093897645795e3fa9b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-5da8-4911-b74f-42dd950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'e685b870f436c8bf4eda02666b99c02631ca165e90a122347929f3e1fff6dbe0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-33f0-4f56-93cd-4d96950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'e854dbc8dfe31447083411d4f597de00e4addfe265a3c3103d8d3a5961ec82f0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-e580-4990-b1f7-48a3950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'e89d9478aa4451584a1e6263dafaa39059e0aac3b1c02f00c64705bbb5449a43']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-f060-4e3a-a928-4bb4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'e8dcdb7f6d3108ba1ad0800ba6167f7456e4a1b2c95038ecd7960989402f54ca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-5194-4f43-b9bf-44cf950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'e97db554bb5fe030afb67f0a683857d124e7e05942f6d77b637056758ac0a4c1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-650c-4a8a-9304-4490950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'eeca7f0a6bcb9132e9ada7c8913aa39eb87aed9955dcc7f870f7c85a3f415362']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-5d90-4c2f-8124-4f37950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'f144d58388ad6137c62581987da8dbb558e347670d79521898fb2b3084372963']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-74f0-4cce-9fa0-4710950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'f1b2aad1a13527a4a420bf395f9aef9be0e024867ec07e7bb4ef142a5adaf1c9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-97a4-4bad-b3ad-4c60950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'f2ef77cc908de0654bfcc4144cac05d56b6f7ba2643b3ba186dbdcaaf4832e32']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-84d4-4b97-822d-4d0b950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'f4f6391577fae61e6aca3040ca8fad69ea545cfc9cfeaf876f92be42e1ce8f5f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-a6c0-4bbd-a5cf-4c97950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'f8002689fec2703e5560634aeaa89fabd96fba28316d31a41bf975f14ad1dfa6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-9f44-43a6-a0dc-494c950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'f851b6fceaaa704f2efc94db26599c64f0b9c99dbb130ee2ad14c598c245ec11']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-969c-4842-bc10-4e5f950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'f8bdb65d54ccab04a506e84f14bdbeef15f6266a7bd6e4e7dfde69de424dd10a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-981c-4cd2-ad6b-4270950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'f987fa5e278b9998b9c44c723a1892f92868da0b0c856777147fe1b10c7a45ed']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-d96c-41eb-8915-456d950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'f9c8bdf92cbd751f35f902fc48760de7d75248742708c9ce95f748273c8f2a4f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-6ce8-454b-b54f-4e36950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'f9ca935d9f3a6aac48de55486eb8ca62f003baf50ced255305048464d9fd0016']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-f704-406f-84d8-4fa4950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'fa019bb31fd99bfbb36bca3bf9b16c589cacd2f9cee2ba061dbb73479d4c389c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5aa7b8c0-950c-4f35-ad48-4943950d210f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T11:40:48.000Z", "modified": "2018-03-13T11:40:48.000Z", "description": "Executable File", "pattern": "[file:hashes.SHA256 = 'fe206a8849d7f95e4233effa97883a03e2d8d3672c0b9af18dcf9d5d59b9f22b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T11:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Artifacts dropped" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Artifacts dropped\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3ebecaa7-b9a3-48a4-becf-194625b24f9d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:53.000Z", "modified": "2018-03-13T13:37:53.000Z", "pattern": "[file:hashes.MD5 = '12d070eb94b43e5ea279f913b1b88888' AND file:hashes.SHA1 = '8e8ee386d56f308511f69045b9b06160f3cc40f9' AND file:hashes.SHA256 = 'f7854d717ea3449b6cf2ed56b8fc1e790dff23df19c62e554f233300faac8750']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--be09f3b1-9fcf-4d5b-848e-41fecd41123d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:52.000Z", "modified": "2018-03-13T13:37:52.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f7854d717ea3449b6cf2ed56b8fc1e790dff23df19c62e554f233300faac8750/analysis/1520467062/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d430-80b4-44a0-83a6-480f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d430-bf34-4151-9467-483d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 23:57:42", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d430-edf4-4b8c-8d3b-46af02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b5694caa-9b22-415f-8272-9c57b3eb08c3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:55.000Z", "modified": "2018-03-13T13:37:55.000Z", "pattern": "[file:hashes.MD5 = 'd19dbd2b682562a9e9f0358e1e213290' AND file:hashes.SHA1 = 'a7d3eca0ca37cfdf4c52b8d1c5dfe66c2c1f0044' AND file:hashes.SHA256 = '2dc8a22cdf1b5f9eedfd45cc7c1e224714fb9ceb7e06dc25b69efb9f45413b0a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2b4622e3-ecfd-4e33-88d1-4be6fee2d27e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:54.000Z", "modified": "2018-03-13T13:37:54.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/2dc8a22cdf1b5f9eedfd45cc7c1e224714fb9ceb7e06dc25b69efb9f45413b0a/analysis/1512481722/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d432-45cc-4353-9e9e-4e5202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d432-7984-452c-8b8e-473102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-05 13:48:42", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d432-07b8-4fd2-b755-424c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--04a11bb7-a841-49e4-b957-a50ff66a07ef", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:58.000Z", "modified": "2018-03-13T13:37:58.000Z", "pattern": "[file:hashes.MD5 = '7d2010d01fc2b0bb71e24e6546c410ce' AND file:hashes.SHA1 = '9bda9db18fd4838cb98da4276b2baa09eb662426' AND file:hashes.SHA256 = '5112d0c215a4ab21157be3752b12c4a5dd663b20a0373f686e8a091341d3ac52']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:37:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--da8cc514-e9c2-43ba-8713-65bd1ee4cc93", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:56.000Z", "modified": "2018-03-13T13:37:56.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5112d0c215a4ab21157be3752b12c4a5dd663b20a0373f686e8a091341d3ac52/analysis/1520438567/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d434-9764-4ebd-8a19-44de02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d434-1094-4f99-904a-46a202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:02:47", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d434-aad4-4885-8226-4bd702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--010c6b65-7d24-4eb1-b9f3-161e4bf63908", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:00.000Z", "modified": "2018-03-13T13:38:00.000Z", "pattern": "[file:hashes.MD5 = '5df549a1a1e3e70a417763230171d0f6' AND file:hashes.SHA1 = '5da098f6c1c09d9f32bbe6b4cc65c98bcb66a19b' AND file:hashes.SHA256 = '7dc0eb78c2d5c8d7a07df541df4766620f68e28e06778c5a6ed70438c9f24499']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3027a1fa-cc56-4b97-9c23-f87a15628a5c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:37:58.000Z", "modified": "2018-03-13T13:37:58.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7dc0eb78c2d5c8d7a07df541df4766620f68e28e06778c5a6ed70438c9f24499/analysis/1518347316/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d436-8620-4a30-b39e-449a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "22/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d437-3720-4d87-a08f-41ef02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-11 11:08:36", "category": "Other", "comment": "Executable File", "uuid": "5aa7d437-981c-43cc-9653-4bdd02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2ea254d8-6356-40c2-962f-e9a22e94b9a2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:02.000Z", "modified": "2018-03-13T13:38:02.000Z", "pattern": "[file:hashes.MD5 = '38b41c40fc0994c69344e6efe6caf786' AND file:hashes.SHA1 = '3fa4f1979a18f2f6abc415fc68da0b74b1acc82f' AND file:hashes.SHA256 = '286011ba8c7e9f16b219d3919eeaa625391446525fab30d7adb532957003304a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a0e300ab-5db9-439a-a31d-078a28483155", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:00.000Z", "modified": "2018-03-13T13:38:00.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/286011ba8c7e9f16b219d3919eeaa625391446525fab30d7adb532957003304a/analysis/1520409829/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d438-48f0-4a4d-9e31-4b0402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d439-78a8-4f6a-9842-4c0f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 08:03:49", "category": "Other", "comment": "Executable File", "uuid": "5aa7d439-ef28-4014-ad4d-486002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7aa4af10-cefa-4496-aa7c-aecaa6ba6915", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:04.000Z", "modified": "2018-03-13T13:38:04.000Z", "pattern": "[file:hashes.MD5 = 'c7ff6ce2b338811932fe36fa6430c1f0' AND file:hashes.SHA1 = '2d37496c54ab77250a112dab7511bb6f6e4e05f0' AND file:hashes.SHA256 = 'a130cd38f7de1d801a78f2c06a596a578ae3d75bf1b17d5d45fc1733c69f4268']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--168731b1-b9f6-49e3-8396-e43356f48865", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:03.000Z", "modified": "2018-03-13T13:38:03.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a130cd38f7de1d801a78f2c06a596a578ae3d75bf1b17d5d45fc1733c69f4268/analysis/1513615961/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d43b-b548-4295-889b-48f502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d43b-c0d8-4831-9e5c-4e2302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-18 16:52:41", "category": "Other", "comment": "Executable File", "uuid": "5aa7d43b-7fac-428f-b3de-4ea202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c3854528-0d86-43d7-9af1-c892adaa2014", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:07.000Z", "modified": "2018-03-13T13:38:07.000Z", "pattern": "[file:hashes.MD5 = '95895033c692be575587b4865bc278c3' AND file:hashes.SHA1 = '611c30a5ff3486fd3b4afb1f8b4a09b4ac8a68cb' AND file:hashes.SHA256 = '15cc66021a04a4667e58ca9a7c8b9382dac1dd5869c788ceae47642454472b3f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e3120171-4e17-469d-87cd-1c3b2214b193", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:05.000Z", "modified": "2018-03-13T13:38:05.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/15cc66021a04a4667e58ca9a7c8b9382dac1dd5869c788ceae47642454472b3f/analysis/1520869141/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d43d-4a68-4633-9904-4c0c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d43e-0f18-4439-8dd1-477b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 15:39:01", "category": "Other", "comment": "Executable File", "uuid": "5aa7d43e-a554-46ed-9c17-47d702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--32755cdb-a46a-4796-a3dc-8cdac5895b13", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:09.000Z", "modified": "2018-03-13T13:38:09.000Z", "pattern": "[file:hashes.MD5 = 'd41325b887cbcb955ce9325045fc8576' AND file:hashes.SHA1 = '1794c15e399551b14e41189347cda5ff06ab651c' AND file:hashes.SHA256 = '241658e90abf3416d97bfeff1e194d03d3103a7b07670b56420b4b4b61308b84']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c8f2386e-a26d-4911-8a45-e5f037add7f3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:08.000Z", "modified": "2018-03-13T13:38:08.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/241658e90abf3416d97bfeff1e194d03d3103a7b07670b56420b4b4b61308b84/analysis/1520871660/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d440-cca8-4bb9-9172-4ac302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d440-c560-4dad-8bc9-4a7002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 16:21:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d440-6374-4024-ac0c-485002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--83b23c1f-380c-4c9b-8ff1-d88a0d77e200", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:12.000Z", "modified": "2018-03-13T13:38:12.000Z", "pattern": "[file:hashes.MD5 = '17bfd2e6a363c52192da32afe98786e9' AND file:hashes.SHA1 = '9d91e7a1b12ddbcef885c025c2309fffb48a65c7' AND file:hashes.SHA256 = 'd3f79eb90bfeccb507f69989ed38e32fddd7108660c92313260a64c798fe0167']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--38764b5c-c154-4392-a0c3-7574c19b999c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:10.000Z", "modified": "2018-03-13T13:38:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d3f79eb90bfeccb507f69989ed38e32fddd7108660c92313260a64c798fe0167/analysis/1517544512/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d443-2fac-4cb1-b781-49c202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d443-b8f4-4703-8b55-4d9002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-02 04:08:32", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d443-ad10-4834-b193-45c602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--91f03806-38a6-41c7-bf7b-59cde7114d4c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:15.000Z", "modified": "2018-03-13T13:38:15.000Z", "pattern": "[file:hashes.MD5 = '15b184dc5f5e2c6cafdf3edce8334a83' AND file:hashes.SHA1 = '7ac5151f5704d285f8b08339cb63cd44d0e96e86' AND file:hashes.SHA256 = 'ed99eea02491a4c659a54cb39f368b7c4713cbc6ef9677f169c1cb09f533bd6d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--06833811-1d61-4866-b351-c35e84d53f29", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:13.000Z", "modified": "2018-03-13T13:38:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ed99eea02491a4c659a54cb39f368b7c4713cbc6ef9677f169c1cb09f533bd6d/analysis/1520441156/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d445-c440-4c2f-bab8-47d102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d445-3758-4fdd-b823-43fa02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:45:56", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d445-8068-4312-b40c-4f4202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1862b97f-3ec9-4764-af14-cb1a39e2e1e2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:17.000Z", "modified": "2018-03-13T13:38:17.000Z", "pattern": "[file:hashes.MD5 = '600a117120bece227b6c0bcda0ccd974' AND file:hashes.SHA1 = '3b86c3eb55a99e65fd531230a45483c5ecf9fa1d' AND file:hashes.SHA256 = '34f08e0d3d5f430e1a3b3604a9c5cb26850967b6f4468a5d1146f1681ef99dad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0e9a8a1d-4d35-4624-8a79-456fb80187e4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:15.000Z", "modified": "2018-03-13T13:38:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/34f08e0d3d5f430e1a3b3604a9c5cb26850967b6f4468a5d1146f1681ef99dad/analysis/1520906160/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d447-44a4-4456-b0b8-410e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d448-de84-4ba7-bf2d-4db502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 01:56:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d448-d3d4-484b-b17d-4d7102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--333502f7-2faf-4732-9cf8-0b57085db280", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:19.000Z", "modified": "2018-03-13T13:38:19.000Z", "pattern": "[file:hashes.MD5 = '496464ba835cd0b5dd8c85a0d0becd9d' AND file:hashes.SHA1 = '0019019258d008f059a4926d795e9d1e70b2c878' AND file:hashes.SHA256 = '64a7fb913f2507a283917dbd3d22ec8335d0cb462e3d92711cd8396b3cf09edb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a0cd4885-4c2a-4471-a8a5-03700ab2cf77", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:17.000Z", "modified": "2018-03-13T13:38:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/64a7fb913f2507a283917dbd3d22ec8335d0cb462e3d92711cd8396b3cf09edb/analysis/1520438973/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d449-1f6c-4691-88e7-41ed02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d44a-d350-4589-b12a-4bc002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:09:33", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d44a-9efc-49ab-a4de-4c2402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3df64f90-91fe-4af4-b4fe-8fd371df1e2b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:21.000Z", "modified": "2018-03-13T13:38:21.000Z", "pattern": "[file:hashes.MD5 = '796b9875421e469913d322cdcefbd394' AND file:hashes.SHA1 = '87caf45c0ebe5fbb4586424343c0130bcbf09f8f' AND file:hashes.SHA256 = 'f2ef77cc908de0654bfcc4144cac05d56b6f7ba2643b3ba186dbdcaaf4832e32']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--05943cc4-e0ee-4d46-b752-673fd1f9347d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:19.000Z", "modified": "2018-03-13T13:38:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f2ef77cc908de0654bfcc4144cac05d56b6f7ba2643b3ba186dbdcaaf4832e32/analysis/1520634831/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d44c-1478-487e-84a2-447102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d44c-37c8-4eeb-9c7c-413802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-09 22:33:51", "category": "Other", "comment": "Executable File", "uuid": "5aa7d44c-a3dc-4b46-95ec-48c002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--73813f31-8277-4a96-abec-99d11d5855d7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:23.000Z", "modified": "2018-03-13T13:38:23.000Z", "pattern": "[file:hashes.MD5 = 'd16db9fc78598014d0dda258c84377e4' AND file:hashes.SHA1 = '38149c57f239b678c4a1ab44cda8639db576c7dc' AND file:hashes.SHA256 = 'ca9d11fb8b3919443e066d8e91587c34191c3b273a0f884c48084df77263de55']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a9d050ef-1ff4-4906-a484-cf8f3f7cad84", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:22.000Z", "modified": "2018-03-13T13:38:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ca9d11fb8b3919443e066d8e91587c34191c3b273a0f884c48084df77263de55/analysis/1520909341/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d44e-faf8-43fc-b619-4d6902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d44e-ed30-4d78-8d87-46f302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 02:49:01", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d44e-42e8-4876-86a7-4a3f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7a9ebf88-5d69-41e7-a572-971cb751e615", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:26.000Z", "modified": "2018-03-13T13:38:26.000Z", "pattern": "[file:hashes.MD5 = 'fae90d5b6a627cbaee52f0b6a8c2c0d6' AND file:hashes.SHA1 = '6f107ea761e5f482fbf544ca1c7edb2a810af8b8' AND file:hashes.SHA256 = '14284152d53c119ad04c986a2a115485ae480d8012603679bf28ec27e3869929']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--98f9a90f-6b1c-45b3-a027-9837ecbb6875", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:24.000Z", "modified": "2018-03-13T13:38:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/14284152d53c119ad04c986a2a115485ae480d8012603679bf28ec27e3869929/analysis/1517308985/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d450-a7e0-4ffc-b70d-439d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/65", "category": "Other", "comment": "Executable File", "uuid": "5aa7d450-5638-4782-949a-47c602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-30 10:43:05", "category": "Other", "comment": "Executable File", "uuid": "5aa7d450-8258-4230-b6f8-4ca502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--694ccc7c-c1e3-459c-be5e-8bbb60cf776d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:28.000Z", "modified": "2018-03-13T13:38:28.000Z", "pattern": "[file:hashes.MD5 = 'adc3f050e41ce0dcdfae7070838b5350' AND file:hashes.SHA1 = 'a227fca87c1bb0ac4e0094101ce96c5d7987a417' AND file:hashes.SHA256 = 'b7fe03048f861222f9a161369e5eb38f67b13eb0de4050be089b394c7f30c593']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--16b262fe-fc38-4a41-aae1-f7c79a3f2b27", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:26.000Z", "modified": "2018-03-13T13:38:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b7fe03048f861222f9a161369e5eb38f67b13eb0de4050be089b394c7f30c593/analysis/1520440682/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d452-2590-408a-ae17-4d7b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "27/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d453-ed58-4039-9783-4d5402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:38:02", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d453-a004-4abc-85b1-481b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7fbaea4b-0ef0-409d-80eb-82e5dfba5994", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:30.000Z", "modified": "2018-03-13T13:38:30.000Z", "pattern": "[file:hashes.MD5 = '7e4026976a304ad0530aac84e5393dc1' AND file:hashes.SHA1 = 'b2d4507bcab81d3038726eff176ca4fef28bd6d6' AND file:hashes.SHA256 = 'a9992d6d8a97f54e2b08ac58e0a50bacc6307033a91315e3ff1bc0a531b3876d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--eb32ed3c-79fb-4635-9706-c65725f4925c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:28.000Z", "modified": "2018-03-13T13:38:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a9992d6d8a97f54e2b08ac58e0a50bacc6307033a91315e3ff1bc0a531b3876d/analysis/1520440334/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d455-83c0-4815-98ed-4bb802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d455-5a18-4dc0-9e7d-410602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:32:14", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d455-caec-45a5-869d-4bd302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2bf82666-d839-4cb4-9d62-47afcbabb8d8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:32.000Z", "modified": "2018-03-13T13:38:32.000Z", "pattern": "[file:hashes.MD5 = 'f97f0c45de189d14bed8dc6584ad2811' AND file:hashes.SHA1 = '477a25663016d6c04221adac86cef0f60fe09aa1' AND file:hashes.SHA256 = 'ae0014aa96e81d431c4c12e052b9dbb18c065eecef79f40d0f808c403e7399bc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--72530e57-9793-49b0-a161-0078753a7e2a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:31.000Z", "modified": "2018-03-13T13:38:31.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ae0014aa96e81d431c4c12e052b9dbb18c065eecef79f40d0f808c403e7399bc/analysis/1520376538/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d457-1148-48a6-9927-456802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d457-0984-49c8-bb9a-41bf02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:58", "category": "Other", "comment": "Executable File", "uuid": "5aa7d457-59cc-4cad-8d8a-467d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5061f21a-a424-479d-b119-eb03ca72474a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:35.000Z", "modified": "2018-03-13T13:38:35.000Z", "pattern": "[file:hashes.MD5 = '8675c7bb67c60346b3d46d48eaa9d004' AND file:hashes.SHA1 = 'ac8183d7692c698b880a016c51f870edd30a25d7' AND file:hashes.SHA256 = '7d1c32f8f47355218320a793c3f0f74c6fa7a19c22f7d01eee947f6960dfa466']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9bf45a52-e2d6-4363-85cd-9f1762674618", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:33.000Z", "modified": "2018-03-13T13:38:33.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7d1c32f8f47355218320a793c3f0f74c6fa7a19c22f7d01eee947f6960dfa466/analysis/1519923960/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d459-7eb8-4559-8173-495e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d45a-cc7c-4649-ad3b-4b3602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-01 17:06:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d45a-986c-4663-a347-46ec02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d3f36e32-07db-4834-8c85-432352352e55", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:37.000Z", "modified": "2018-03-13T13:38:37.000Z", "pattern": "[file:hashes.MD5 = '33161cc105dfaa7ad511efc5648e7dad' AND file:hashes.SHA1 = '6347ee6ae62b1f94c03aed4a8be54c68408b8913' AND file:hashes.SHA256 = '34a7e963ff82d073b6c2b2fda7bfbb9ecce9bb4e437be856252f14de6040b8ad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e89df188-9ef2-4fb1-af1e-7d8990320d01", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:36.000Z", "modified": "2018-03-13T13:38:36.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/34a7e963ff82d073b6c2b2fda7bfbb9ecce9bb4e437be856252f14de6040b8ad/analysis/1520376429/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d45c-96b0-4947-8e07-415b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d45c-1fe0-4055-8088-419d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:09", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d45c-f884-40e4-900c-486702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b6089b1d-ce2c-482b-acbd-4940ddf9b43d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:39.000Z", "modified": "2018-03-13T13:38:39.000Z", "pattern": "[file:hashes.MD5 = '0afeecbcc47c0cf76c36e5b4c6412122' AND file:hashes.SHA1 = 'a6a231c081b7bf58316b24aa9a43bb982962958d' AND file:hashes.SHA256 = 'caec6bb70c5c1ba33b2c0981e39b335177b3a31d9fedfd23e4c8194abdb3d6f1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--776e3fae-22a7-473d-8c9e-448f7cebe70c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:38.000Z", "modified": "2018-03-13T13:38:38.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/caec6bb70c5c1ba33b2c0981e39b335177b3a31d9fedfd23e4c8194abdb3d6f1/analysis/1520376476/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d45e-bc84-4806-9b2f-443a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d45e-fdac-438d-9b71-4ae202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:56", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d45e-7534-4706-9853-4f4e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--943bbe65-be8f-4fcd-a963-8f40bee18ea7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:41.000Z", "modified": "2018-03-13T13:38:41.000Z", "pattern": "[file:hashes.MD5 = '01ed114fde71c5f9e77dfdcec884767a' AND file:hashes.SHA1 = '1ef6aed3d369cf10977426fab35e78886469ada3' AND file:hashes.SHA256 = 'fb74870bd4441e5933712c79804c3d9aeb0ba86162295990183abe8daa235c3d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--327db92f-c41f-47c6-9791-7cde1d9ce511", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:40.000Z", "modified": "2018-03-13T13:38:40.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/fb74870bd4441e5933712c79804c3d9aeb0ba86162295990183abe8daa235c3d/analysis/1520441529/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d460-b400-45e5-ac7b-4ca302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d460-0188-48d5-b969-4b2902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:52:09", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d460-4500-47c2-be1c-4fe902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8a6de377-1b81-4988-9132-ed8d9ecf36ff", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:45.000Z", "modified": "2018-03-13T13:38:45.000Z", "pattern": "[file:hashes.MD5 = '2d1aa2d568bfa93cbeb9ec35e53163b0' AND file:hashes.SHA1 = '5b9413061ef40b8a946c2ecd6bd2640a923ecb93' AND file:hashes.SHA256 = '8a02499298a1d12223a751a288092e6f196957e84179b91cfebb6093ac15fd54']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3ea6b034-235f-44ae-984c-8e5d8e2b3499", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:43.000Z", "modified": "2018-03-13T13:38:43.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8a02499298a1d12223a751a288092e6f196957e84179b91cfebb6093ac15fd54/analysis/1520439745/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d463-5d2c-42fb-a570-45c702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d463-6cb8-438f-a3b8-4ff802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:22:25", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d463-782c-40e6-bacb-45a702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--39755ccf-9fff-4b16-b894-a4742fe0b548", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:47.000Z", "modified": "2018-03-13T13:38:47.000Z", "pattern": "[file:hashes.MD5 = '1b3ecd957973c315fbab3aa1bccd3ace' AND file:hashes.SHA1 = '6cdc4027a5dc1219e26a2a0acbc2fcb7d4c5eddd' AND file:hashes.SHA256 = 'e43c2070435f9aa704408a6e4f9112b2e83288039bf8382023c3973956c670ac']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--84cb6f05-0dd6-4fd0-869b-5051282359e6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:45.000Z", "modified": "2018-03-13T13:38:45.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e43c2070435f9aa704408a6e4f9112b2e83288039bf8382023c3973956c670ac/analysis/1517469316/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d465-ca10-43d4-9874-417002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "26/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d466-c124-416f-828e-412202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-01 07:15:16", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d466-d7f0-42ac-a1b9-4eaa02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f2989d98-57c2-4e75-b139-d98f1debcd6e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:49.000Z", "modified": "2018-03-13T13:38:49.000Z", "pattern": "[file:hashes.MD5 = 'f9d75d3dbab78e66097423fb272ad696' AND file:hashes.SHA1 = 'e21037f9b69f056a730318b9d924b102d3ce6beb' AND file:hashes.SHA256 = 'e00b0692087d2739aea7a8b42b92fd6a09fdee29744a760d7553b002ff530550']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--91ba1536-8bd4-4a09-a11f-590dd2f76adb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:47.000Z", "modified": "2018-03-13T13:38:47.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e00b0692087d2739aea7a8b42b92fd6a09fdee29744a760d7553b002ff530550/analysis/1520488603/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d467-2038-40d1-b643-475302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d468-55cc-4efc-bb93-4d6402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:56:43", "category": "Other", "comment": "Executable File", "uuid": "5aa7d468-a094-4196-ada1-420302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4846a202-a825-4439-a27b-2e9855f3e75b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:51.000Z", "modified": "2018-03-13T13:38:51.000Z", "pattern": "[file:hashes.MD5 = '1e0220c4b3b7df9f64f35de39aa9886c' AND file:hashes.SHA1 = '25b03486e53fd57f21be2b2dad2ff6375b60d9b6' AND file:hashes.SHA256 = 'a3d86b86f08def93a12afbbcb1748d60859277c3515c2fbf211a1e0d9cf0998d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fac91df2-91df-4947-8855-c63df8ea4719", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:49.000Z", "modified": "2018-03-13T13:38:49.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a3d86b86f08def93a12afbbcb1748d60859277c3515c2fbf211a1e0d9cf0998d/analysis/1520904540/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d46a-2044-4b48-8c3f-42b302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d46a-fe20-471b-8695-4cc202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 01:29:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d46a-9f24-4d01-9bd0-42af02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e01012ad-efbd-43a2-ae1e-925c8c88bdfb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:53.000Z", "modified": "2018-03-13T13:38:53.000Z", "pattern": "[file:hashes.MD5 = 'a74246c45d5b96a8d1e1a2471b8d363e' AND file:hashes.SHA1 = 'fbc538bd30a4af995606b04576071012568749b7' AND file:hashes.SHA256 = '35ef838fa56f2c30dd62cf97421e8d4c322d593992560f1631c68492a0d39150']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--875c39a6-aefb-4cab-8dd1-76de2098bc65", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:52.000Z", "modified": "2018-03-13T13:38:52.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/35ef838fa56f2c30dd62cf97421e8d4c322d593992560f1631c68492a0d39150/analysis/1520438110/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d46c-d190-46bf-9ee4-4ebe02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d46c-868c-490b-b48f-49b002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:55:10", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d46c-a954-4ae1-b55e-465f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--170a0ade-9dbd-46a0-88c8-9b9c31f603df", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:56.000Z", "modified": "2018-03-13T13:38:56.000Z", "pattern": "[file:hashes.MD5 = '0b08cf45db88cdaf34b088daff9ad54d' AND file:hashes.SHA1 = 'b37f6583310053975dead7cd6d69044799d891af' AND file:hashes.SHA256 = 'b4e43c40405579f7e508e5d546975b4b2bff83a70d7dfe98fa64dc407894d103']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ee355cf8-ecb9-43f6-8af7-149019418b7d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:54.000Z", "modified": "2018-03-13T13:38:54.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b4e43c40405579f7e508e5d546975b4b2bff83a70d7dfe98fa64dc407894d103/analysis/1516822257/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d46e-7280-46f6-b4e0-48c402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d46f-e5c0-4ef2-80dc-47d402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-24 19:30:57", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d46f-6ff8-4c61-a5eb-4cbe02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--acaf2fa6-6f3c-4b06-a5f9-3bb31b191409", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:58.000Z", "modified": "2018-03-13T13:38:58.000Z", "pattern": "[file:hashes.MD5 = '67711e0c8d11d64091a3b694c340d087' AND file:hashes.SHA1 = '672b50a2881cc8f90c34f742f9972a978ca0615a' AND file:hashes.SHA256 = '80caab696b69df9b76ed44440e6d9a0ad360ba521f0229014986abb923f6019c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:38:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1eb655cb-6991-4136-9a71-5d07c824734e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:56.000Z", "modified": "2018-03-13T13:38:56.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/80caab696b69df9b76ed44440e6d9a0ad360ba521f0229014986abb923f6019c/analysis/1520439559/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d470-03e0-409e-a0ae-4bd402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d471-dd28-4342-a208-41c402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:19:19", "category": "Other", "comment": "Executable File", "uuid": "5aa7d471-703c-46e6-9528-459602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57b549c9-a6f5-4fbe-93de-835d64e5d801", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:00.000Z", "modified": "2018-03-13T13:39:00.000Z", "pattern": "[file:hashes.MD5 = '9af8749f111df6d6439b7e78485c8643' AND file:hashes.SHA1 = '74bedd4b79c0211fd82b8f97769823d427118306' AND file:hashes.SHA256 = '272c9c24b43e879d75da6c9b308510c80ce989101e5fd221843d6e35ce442191']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1c17f990-5b27-40d9-a80b-e2ff9a10c38f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:38:59.000Z", "modified": "2018-03-13T13:38:59.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/272c9c24b43e879d75da6c9b308510c80ce989101e5fd221843d6e35ce442191/analysis/1513253566/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d473-b2a4-482a-9ee4-49cf02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "53/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d473-37d4-4ee9-87ee-4a7c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-14 12:12:46", "category": "Other", "comment": "Executable File", "uuid": "5aa7d473-e524-4236-9c31-411902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--83846430-c5cf-403f-821c-665b6d7d24ae", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:03.000Z", "modified": "2018-03-13T13:39:03.000Z", "pattern": "[file:hashes.MD5 = '220733f225c7dd33665951ad311f9d8f' AND file:hashes.SHA1 = '6fc79bbca8a6a182423379718e8dec62b59c5435' AND file:hashes.SHA256 = '30f185c47f29987917fda34fa979573f19269c70bfcb9457c6a1991a04953a40']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bac69422-8149-4b9b-b191-268f042035aa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:01.000Z", "modified": "2018-03-13T13:39:01.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/30f185c47f29987917fda34fa979573f19269c70bfcb9457c6a1991a04953a40/analysis/1520869021/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d475-24e8-4dd4-bb87-499102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d475-7158-45a4-9f2e-4f7302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 15:37:01", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d475-6c70-4d55-90f2-4b7802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f7e44f2c-acce-4a13-bb4f-7a8a3f561f6a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:05.000Z", "modified": "2018-03-13T13:39:05.000Z", "pattern": "[file:hashes.MD5 = '4451d527ee8f08e855da571753196231' AND file:hashes.SHA1 = '3e3dfe6488ab0ea0d2b11bd97435d00c32c0cbe4' AND file:hashes.SHA256 = '27804dda3c5bb183970cc7c38ef0ebce44be5f9f0ffeea4f224bc5b7fa91953c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1bdd2424-ec61-48b5-b0fc-cfe234973c69", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:03.000Z", "modified": "2018-03-13T13:39:03.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/27804dda3c5bb183970cc7c38ef0ebce44be5f9f0ffeea4f224bc5b7fa91953c/analysis/1519911764/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d477-3a6c-4671-988d-43a502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "24/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d478-b16c-455e-9eb2-4bf202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-01 13:42:44", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d478-7fb0-47e8-a63a-487902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--860df4c8-2d41-4fc7-b3fc-abea9a79399a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:07.000Z", "modified": "2018-03-13T13:39:07.000Z", "pattern": "[file:hashes.MD5 = 'e7e58f34bfbf97f1b6675022b072ccb9' AND file:hashes.SHA1 = '4d8fecf211cdabac32d6157ed138cfdb637626f4' AND file:hashes.SHA256 = 'd13459e6a495ecac9e21b95354ad12c22203c9f7cf87390388ad15a9cd21b5f4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--cd3742e9-9515-451b-9d86-0900994ffe1e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:05.000Z", "modified": "2018-03-13T13:39:05.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d13459e6a495ecac9e21b95354ad12c22203c9f7cf87390388ad15a9cd21b5f4/analysis/1518195325/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d479-b75c-48b6-abaf-46dc02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d47a-5768-41c7-a353-491802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-09 16:55:25", "category": "Other", "comment": "Executable File", "uuid": "5aa7d47a-6378-4394-b31d-488802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f2bf99ab-22ca-42a8-ade9-dd3259513e1d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:09.000Z", "modified": "2018-03-13T13:39:09.000Z", "pattern": "[file:hashes.MD5 = '1ee0336e030dc9d11b09d43f33cdb9ed' AND file:hashes.SHA1 = 'cf76616a5b3a58055407d69df9e2ebbba460ed48' AND file:hashes.SHA256 = 'ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f7a2f44d-913b-412f-8a87-29015a121194", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:08.000Z", "modified": "2018-03-13T13:39:08.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e/analysis/1520441582/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d47c-1828-4c0e-abcc-428b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d47c-015c-4316-915d-48ba02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:53:02", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d47c-ac20-4d5e-840e-4c0702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3cdbd820-ccfe-4805-a87f-66639a605863", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:12.000Z", "modified": "2018-03-13T13:39:12.000Z", "pattern": "[file:hashes.MD5 = 'b34ddb4c2617adc0eec48099285cae2e' AND file:hashes.SHA1 = '81db78b6ed310993a3e524bcf0a83ecd1ffda836' AND file:hashes.SHA256 = '515651cc16fe74451eee5d02ed357a2cf41c5f05ef81140620f1f472fb3043bb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d295ca83-4c3b-44e9-bf94-8ea103e0ca84", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:10.000Z", "modified": "2018-03-13T13:39:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/515651cc16fe74451eee5d02ed357a2cf41c5f05ef81140620f1f472fb3043bb/analysis/1520438619/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d47e-91f4-47bf-9789-4f1f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "38/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d47e-e238-4402-aa16-400f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:03:39", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d47f-edac-4630-bda6-41da02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5282a1ef-c68b-441b-b128-7b98762c7db5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:14.000Z", "modified": "2018-03-13T13:39:14.000Z", "pattern": "[file:hashes.MD5 = '113920d295806c64d572d3fdfdcde155' AND file:hashes.SHA1 = '7eed79144d9d22e809bb7242e38fe47f5bbae44d' AND file:hashes.SHA256 = 'bcdefbeb609a3d839518b3fe9d77b138e4b8a7f3208e963650a5a2aac6373e25']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--52b803c3-0c4c-414f-ab7f-61c009b4c3f9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:12.000Z", "modified": "2018-03-13T13:39:12.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/bcdefbeb609a3d839518b3fe9d77b138e4b8a7f3208e963650a5a2aac6373e25/analysis/1517717913/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d480-9890-456b-b00c-418402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d481-afdc-455a-81f3-47fd02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-04 04:18:33", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d481-cfa8-46a2-bc2e-4b5802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ffee8c30-fe29-4c86-9b73-30c567bf8611", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:16.000Z", "modified": "2018-03-13T13:39:16.000Z", "pattern": "[file:hashes.MD5 = 'b2f0dc03faa5492668a2ab6f737bf580' AND file:hashes.SHA1 = '458e9d74dd774b3c259a88ba140c03d258d31f51' AND file:hashes.SHA256 = '79f9cb65e970ea7d4d6ad21a3ee13a7ba356aaf355d67c5a4e75495f8544a0d7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6d666a98-8722-41c6-951c-010645d867ea", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:14.000Z", "modified": "2018-03-13T13:39:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/79f9cb65e970ea7d4d6ad21a3ee13a7ba356aaf355d67c5a4e75495f8544a0d7/analysis/1520439321/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d483-a450-4e89-9634-4b3502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "24/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d483-ee0c-4103-a713-451602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:15:21", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d483-336c-4fda-b9c3-414602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8e10aae3-e3c3-4fb9-8871-64897fb41a12", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:18.000Z", "modified": "2018-03-13T13:39:18.000Z", "pattern": "[file:hashes.MD5 = '98798444d0a29911186490377d81b4d7' AND file:hashes.SHA1 = 'e338463a931584f91a86a39a975167b8ed296261' AND file:hashes.SHA256 = '1c41511f967771ab8fbd4c96a857637efbb88b4d86d180c7bbd31fc748890d27']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--51bf0041-0608-40d2-a4b8-dac196a75558", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:17.000Z", "modified": "2018-03-13T13:39:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/1c41511f967771ab8fbd4c96a857637efbb88b4d86d180c7bbd31fc748890d27/analysis/1510538758/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d485-87b0-45db-af73-4fd402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/65", "category": "Other", "comment": "Executable File", "uuid": "5aa7d485-2b6c-48c6-aeb2-45d602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-13 02:05:58", "category": "Other", "comment": "Executable File", "uuid": "5aa7d485-ee5c-4637-9ecd-46d602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2a95ad9c-9614-4175-9c77-307846c62223", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:21.000Z", "modified": "2018-03-13T13:39:21.000Z", "pattern": "[file:hashes.MD5 = '282cff5cbced7c1993c0d48bf294e8e4' AND file:hashes.SHA1 = 'f5ed24c74bce1dd3201f5d3a3271c9e5fb26e5c1' AND file:hashes.SHA256 = '24829d1c8611a0ac01fc8139fbda91f52e76da46b9219044f70917c03b186be6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1c9db02b-c9a4-4f2d-8e66-4d1116798eb4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:19.000Z", "modified": "2018-03-13T13:39:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/24829d1c8611a0ac01fc8139fbda91f52e76da46b9219044f70917c03b186be6/analysis/1520437741/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d487-5984-4cd3-8bec-48bd02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d488-c7d4-417f-9fbf-4c2302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:49:01", "category": "Other", "comment": "Executable File", "uuid": "5aa7d488-4e48-4b6f-9927-405b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e709461d-0ae6-468d-87eb-63960bd22851", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:23.000Z", "modified": "2018-03-13T13:39:23.000Z", "pattern": "[file:hashes.MD5 = '672104a5544738f88e98ca2dcadf15b5' AND file:hashes.SHA1 = 'c9dd0aa112ed4fda6fdfb13e9a7b17843ee58407' AND file:hashes.SHA256 = 'e9f64d3adddf546b49d2281519c8ada60cfbb3abd6b66a6ba25992cd6627ad26']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--30dce96c-9cdd-40ea-8945-b106b9b4a3b2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:22.000Z", "modified": "2018-03-13T13:39:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e9f64d3adddf546b49d2281519c8ada60cfbb3abd6b66a6ba25992cd6627ad26/analysis/1514641250/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d48a-0914-48d2-bd46-4a5602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "23/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d48a-13f0-4889-a376-487102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-30 13:40:50", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d48a-f5a8-4f70-b1e0-435c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--21ebf0fd-7772-45af-b54c-abc5df09ea6f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:26.000Z", "modified": "2018-03-13T13:39:26.000Z", "pattern": "[file:hashes.MD5 = 'f8a8643164f2ed8413b88540b540440f' AND file:hashes.SHA1 = 'd814c0bff821ba4478f10f562c26ac47e0d0128b' AND file:hashes.SHA256 = '87ae0ce6d13939d0f048889d02da0f7faecd7707705b05b387b8e2cffaea5312']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--90930896-570d-4f08-9767-9299e3e25f8c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:24.000Z", "modified": "2018-03-13T13:39:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/87ae0ce6d13939d0f048889d02da0f7faecd7707705b05b387b8e2cffaea5312/analysis/1520913599/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d48c-e420-4e9a-ab90-482e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d48c-8d04-4709-a0f8-41ae02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:59:59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d48c-0c9c-461a-8a79-48f602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--db0cef85-c247-4270-a64b-cfc6208435b7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:28.000Z", "modified": "2018-03-13T13:39:28.000Z", "pattern": "[file:hashes.MD5 = '461b57e5434e0d87d2f673815cd1285e' AND file:hashes.SHA1 = '0757b4581ac588ed47a7349fcf71c931c26631b3' AND file:hashes.SHA256 = '9094ab3ff3c91dfe6228bf3d225433b16442047fa63ed5e00f15dffc5676dac6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--617a92ab-8635-4f5e-80c9-a714809d0592", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:26.000Z", "modified": "2018-03-13T13:39:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9094ab3ff3c91dfe6228bf3d225433b16442047fa63ed5e00f15dffc5676dac6/analysis/1520439929/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d48e-1f38-4ba4-86b7-4a0702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d48f-38a8-4f1e-8897-483002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:25:29", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d48f-21b8-4f60-9cbb-4b5902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--73918517-e510-4af0-a019-bf2bee56493f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:30.000Z", "modified": "2018-03-13T13:39:30.000Z", "pattern": "[file:hashes.MD5 = '3e4c773475d8df2d1da72180e574f37a' AND file:hashes.SHA1 = '600473e6100efc02af9220f7c33f83ad65112d27' AND file:hashes.SHA256 = '0b2a23066f3601cfcc99b7555a552807946c3da8c0a8519f52b4175e72828c31']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--49ea5f6c-b55f-42f9-aa76-b9d21ef849da", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:28.000Z", "modified": "2018-03-13T13:39:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0b2a23066f3601cfcc99b7555a552807946c3da8c0a8519f52b4175e72828c31/analysis/1520437366/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d491-7eec-46dc-931d-481602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d491-69c0-426d-bf00-4e8f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:42:46", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d491-e848-4943-a45d-483602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aef2b037-4ed7-4588-8cde-a018c637147c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:33.000Z", "modified": "2018-03-13T13:39:33.000Z", "pattern": "[file:hashes.MD5 = '2423cad996dfbacdf410f73d2498690a' AND file:hashes.SHA1 = 'c4529be3f68f616a53055c13b98519bd0b253128' AND file:hashes.SHA256 = '869d9b7e5f9f9c79e33e359c131639b870aaf6e673ffe6b05ae57f4de3bee7c1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a3c0c9b1-aa83-4af5-be53-f932ccf256bb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:31.000Z", "modified": "2018-03-13T13:39:31.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/869d9b7e5f9f9c79e33e359c131639b870aaf6e673ffe6b05ae57f4de3bee7c1/analysis/1517469488/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d493-2ce0-4b0d-bfb5-4b0202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "26/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d494-0044-42fe-9e75-419402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-01 07:18:08", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d494-98a0-4ab0-80d5-436602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--62d5dec4-9817-4b1a-bb14-609a1b6758a5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:35.000Z", "modified": "2018-03-13T13:39:35.000Z", "pattern": "[file:hashes.MD5 = '018e3c2fa91be513e3bdd1642b576579' AND file:hashes.SHA1 = '736292176ccdca2e2ad5d70da4f4f873b6e40ced' AND file:hashes.SHA256 = '11aa9301346258b1e950607dfdb37eabf874e93406c1454c9a4bc905d1ccf925']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--629868f3-c236-41a5-a066-de88f0bc5754", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:33.000Z", "modified": "2018-03-13T13:39:33.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/11aa9301346258b1e950607dfdb37eabf874e93406c1454c9a4bc905d1ccf925/analysis/1519376346/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d495-d784-4176-881a-42f902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d496-4a08-4727-a281-4eda02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-23 08:59:06", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d496-f4c0-4065-accf-427202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5453664b-9768-452f-80d9-b9a02391183d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:37.000Z", "modified": "2018-03-13T13:39:37.000Z", "pattern": "[file:hashes.MD5 = '6c918642ed55f5aed93a4a49b43c2865' AND file:hashes.SHA1 = '7192ef47502bd1ccd8554a0a4cf0b4e18c2544a7' AND file:hashes.SHA256 = '3342a7b78e6e3cd56c7abd51e1c66f94cf37fd5ec8fc7eef2c8905b00f96d69c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--588bfd9d-f8dc-46b6-8229-c99a0a18fa93", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:35.000Z", "modified": "2018-03-13T13:39:35.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3342a7b78e6e3cd56c7abd51e1c66f94cf37fd5ec8fc7eef2c8905b00f96d69c/analysis/1463787328/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d498-0408-435e-933f-438402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "43/57", "category": "Other", "comment": "Executable File", "uuid": "5aa7d498-f89c-49ab-be6c-435002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2016-05-20 23:35:28", "category": "Other", "comment": "Executable File", "uuid": "5aa7d498-221c-40e1-8ba8-48ea02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--76e97e10-38c3-41c9-a84d-5614621238d5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:39.000Z", "modified": "2018-03-13T13:39:39.000Z", "pattern": "[file:hashes.MD5 = '8a0ec9cd97b84b45be7c72601e625656' AND file:hashes.SHA1 = '7e09feadb08692ae98f1d5c7effb0074acbfe93a' AND file:hashes.SHA256 = 'd4e793361db4e58aaf534f93b57e4ae5e2e53583caebede11522cb757e29696c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--281801c2-274e-4e56-9cce-7547583867fd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:38.000Z", "modified": "2018-03-13T13:39:38.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d4e793361db4e58aaf534f93b57e4ae5e2e53583caebede11522cb757e29696c/analysis/1515019478/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d49a-4ed4-4d11-9795-4f6a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d49a-9b54-49ca-a331-412902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 22:44:38", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d49a-79b8-44b3-9d2d-469d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--993c1778-6454-40b9-bf98-e2c2993d751c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:41.000Z", "modified": "2018-03-13T13:39:41.000Z", "pattern": "[file:hashes.MD5 = '54a65804bbc30628dc9000ae727d5d33' AND file:hashes.SHA1 = '02602936fbca7c3f27e0ce476121c55b369b6121' AND file:hashes.SHA256 = '7aee0d6cba97a15b3b86b5be47b741dedc718fdcc6975a37875ce9de5db437fe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--99fd2972-6ddc-4f44-86bf-cf3cdee3d8dd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:40.000Z", "modified": "2018-03-13T13:39:40.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7aee0d6cba97a15b3b86b5be47b741dedc718fdcc6975a37875ce9de5db437fe/analysis/1520376525/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d49c-dd44-4f5c-b2f1-47be02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d49c-9a74-4f48-8b28-4cf102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:45", "category": "Other", "comment": "Executable File", "uuid": "5aa7d49d-f398-4bc7-90b7-4d3402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--629083e5-c228-4a5f-ab26-905d65f29816", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:44.000Z", "modified": "2018-03-13T13:39:44.000Z", "pattern": "[file:hashes.MD5 = 'abfe0c27307297645dd04d427d28a952' AND file:hashes.SHA1 = '2d2849c57e3deb0347cb3a718d731fad335c433d' AND file:hashes.SHA256 = 'f9c8bdf92cbd751f35f902fc48760de7d75248742708c9ce95f748273c8f2a4f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--30fc814c-16cf-402d-8af4-b1b42f1f0670", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:43.000Z", "modified": "2018-03-13T13:39:43.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f9c8bdf92cbd751f35f902fc48760de7d75248742708c9ce95f748273c8f2a4f/analysis/1511352248/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d49f-be2c-4d8e-b812-428702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d49f-2830-4d41-9f3a-401402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-22 12:04:08", "category": "Other", "comment": "Executable File", "uuid": "5aa7d49f-404c-4da8-8315-4f4a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--973eccaa-c84b-4e8a-acdc-20fb1cced3d0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:47.000Z", "modified": "2018-03-13T13:39:47.000Z", "pattern": "[file:hashes.MD5 = 'ce1a8c90a640d4081afce312f5b63a7b' AND file:hashes.SHA1 = '849466b52c51a87671829e82455f07a88b2d462b' AND file:hashes.SHA256 = '8935407185ddc8197b8cd84239faa2ab31e87178ec0c7ad0205a4bb6a8bca6f6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3bc155aa-8c8a-4ad9-a170-238d59cd6423", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:45.000Z", "modified": "2018-03-13T13:39:45.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8935407185ddc8197b8cd84239faa2ab31e87178ec0c7ad0205a4bb6a8bca6f6/analysis/1520488528/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4a1-d57c-498c-ab6f-409602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4a1-6804-47f4-8d8c-43f902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:55:28", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4a1-3808-4b15-8934-4a5602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9669a60a-a564-40cc-90f3-6a0619ddf84b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:49.000Z", "modified": "2018-03-13T13:39:49.000Z", "pattern": "[file:hashes.MD5 = '33a0188d72cde29c15116de017e11961' AND file:hashes.SHA1 = 'c766b13c0ea08b74135235407766b63e18c991e4' AND file:hashes.SHA256 = '34bf67c997bf5b450a13538ea540080a1c97fff1c7453d497acf28539cf82464']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7472369f-9901-4c09-bfb1-244c7d70e65e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:47.000Z", "modified": "2018-03-13T13:39:47.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/34bf67c997bf5b450a13538ea540080a1c97fff1c7453d497acf28539cf82464/analysis/1520438031/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4a4-44dc-4812-be92-4f2d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4a4-fed0-4308-83d8-4c4202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:53:51", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4a4-5fd4-4f09-96d4-4c1002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f9456adf-90ba-400d-ba2a-f34cd7f929d0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:51.000Z", "modified": "2018-03-13T13:39:51.000Z", "pattern": "[file:hashes.MD5 = 'c1fbad7bd2351ab8323b12199998d2ac' AND file:hashes.SHA1 = 'fb53d29c6b026089a8c13ec5d1dcfc33112edd50' AND file:hashes.SHA256 = 'b34964eff2f2c8f85c4ed710d0eab0e40c0268447a703bc277ee016e804c79b4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c51d359b-36fa-4a3f-8c24-f31adb564a9a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:50.000Z", "modified": "2018-03-13T13:39:50.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b34964eff2f2c8f85c4ed710d0eab0e40c0268447a703bc277ee016e804c79b4/analysis/1466483930/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4a6-5c84-46b7-8113-48d202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/56", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4a6-34d4-42cd-ac69-4f3a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2016-06-21 04:38:50", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4a6-b494-4328-a5c3-449902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eb54ed4e-6811-4c83-8aee-c334fee7214c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:54.000Z", "modified": "2018-03-13T13:39:54.000Z", "pattern": "[file:hashes.MD5 = 'e571be01ba923680e39064b3ce1ad342' AND file:hashes.SHA1 = '35924a68cc4f15eaa33e0be9d8e5b5c34448753c' AND file:hashes.SHA256 = '4cb074da79840e68901060afb79029b8eedd2ea6c803eb0c44dd46bad2cd4b45']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4966f0ba-fea3-4837-b833-8f9a5d41d38e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:52.000Z", "modified": "2018-03-13T13:39:52.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4cb074da79840e68901060afb79029b8eedd2ea6c803eb0c44dd46bad2cd4b45/analysis/1518194996/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4a8-ec44-421a-b630-456a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "45/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4a9-348c-4011-bcd8-41db02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-09 16:49:56", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4a9-b2a4-466a-a757-416102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5f4d9667-75ad-4a32-9e13-ad54428acb2b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:56.000Z", "modified": "2018-03-13T13:39:56.000Z", "pattern": "[file:hashes.MD5 = 'c82801ac3f8651f0669b63de2fbf70e8' AND file:hashes.SHA1 = '7aa64f41515a95fc1df84e5cb9afb97afabd073e' AND file:hashes.SHA256 = '07c2f262f84c7013cb83f25027e86d308f6a7867cb777b978ddd78e999fab187']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a91d690d-70d7-4949-bfb0-6067f001a596", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:55.000Z", "modified": "2018-03-13T13:39:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/07c2f262f84c7013cb83f25027e86d308f6a7867cb777b978ddd78e999fab187/analysis/1520437230/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4ab-0b14-4c19-879e-400202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4ab-f35c-45e6-893f-4abe02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:40:30", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4ab-95b8-4ea1-b3c1-41c702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9041116a-b6b5-4d5c-a565-d6178035272b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:59.000Z", "modified": "2018-03-13T13:39:59.000Z", "pattern": "[file:hashes.MD5 = '1f666fae6ac29facbea7b29a68f92964' AND file:hashes.SHA1 = 'cbc68d223976399fafcaec118e40263f1b7c4a87' AND file:hashes.SHA256 = '817daa9d76d0dc834cd63c905703412f3c749c91f4e79945427bc713a18cc5cb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:39:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--848f6b87-3abc-4578-a29d-3d36b95393df", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:57.000Z", "modified": "2018-03-13T13:39:57.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/817daa9d76d0dc834cd63c905703412f3c749c91f4e79945427bc713a18cc5cb/analysis/1520488511/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4ad-40ac-4c9b-8ff6-448502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4ad-9628-40df-aac2-4c4602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:55:11", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4ad-b4f0-4f6b-8f81-47bd02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9f28f790-484f-41c7-98fd-19c53a5784ad", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:01.000Z", "modified": "2018-03-13T13:40:01.000Z", "pattern": "[file:hashes.MD5 = '847994b3a270208c427f6a8584fe494d' AND file:hashes.SHA1 = '079cfe48c45f90318bb4c819b246957b7be10e1a' AND file:hashes.SHA256 = 'c0296ba94b4445a4e3be227a31d3ccba011ebb358e93224a5141f53e9f6ec832']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ccefa011-af8a-4a21-ae83-32e24a2bcf5d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:39:59.000Z", "modified": "2018-03-13T13:39:59.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/c0296ba94b4445a4e3be227a31d3ccba011ebb358e93224a5141f53e9f6ec832/analysis/1519825446/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4af-4a14-4493-becd-4cf002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "25/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4b0-d24c-44c4-87fc-4a8502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-28 13:44:06", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4b0-76b4-48df-9b73-40fc02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--20a1faef-5b03-4328-a877-a6d9ecce874d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:03.000Z", "modified": "2018-03-13T13:40:03.000Z", "pattern": "[file:hashes.MD5 = '249a5fb9382f9b42fc5b09c14cfb469e' AND file:hashes.SHA1 = '2b3a9ad7772c5592c2ecb4380bada0ee52000b56' AND file:hashes.SHA256 = 'bafb6b31625dac34208b40dfbd0d61632a0096e8eac5220e80c4b8225fcb5b61']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d3df38dc-94a4-490a-a393-30f28bb71c2a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:02.000Z", "modified": "2018-03-13T13:40:02.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/bafb6b31625dac34208b40dfbd0d61632a0096e8eac5220e80c4b8225fcb5b61/analysis/1520855160/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4b2-a8bc-4a91-b4ac-4e4d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4b2-2904-47fa-b3ab-413a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 11:46:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4b2-ab0c-482e-890b-4dd902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--62f011a5-158a-4e17-9274-373a8afa7f89", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:06.000Z", "modified": "2018-03-13T13:40:06.000Z", "pattern": "[file:hashes.MD5 = '8cf8cd4a3befdb12261674987279d455' AND file:hashes.SHA1 = '2dd5c1be6b8b31ed18e6eb1496ac7e63e938cf8c' AND file:hashes.SHA256 = '379c6ededb129c04d6cb3feb76bae8f403e12c2309cc0b26514ced95e154be0d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fd076d81-b315-4442-825d-b43dd7931e58", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:04.000Z", "modified": "2018-03-13T13:40:04.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/379c6ededb129c04d6cb3feb76bae8f403e12c2309cc0b26514ced95e154be0d/analysis/1520438138/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4b4-0b24-40f3-b643-4b4902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4b5-b158-4878-bc52-4b6902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:55:38", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4b5-e844-4e36-b5bf-431f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2910e51e-9648-4e47-afdf-a4e987e19b36", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:08.000Z", "modified": "2018-03-13T13:40:08.000Z", "pattern": "[file:hashes.MD5 = 'cbadd4db74b440b6d24c2c6fb7fd9944' AND file:hashes.SHA1 = '14b303d1dc690a8b7494cdd5641ae2114d90e618' AND file:hashes.SHA256 = '316c77088d181a3dc4021ac2631fd1531f9a9602db70b90fe6901170ebe43c82']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--de7ed8dc-8696-458b-bb57-f9f9108072ec", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:06.000Z", "modified": "2018-03-13T13:40:06.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/316c77088d181a3dc4021ac2631fd1531f9a9602db70b90fe6901170ebe43c82/analysis/1520437926/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4b6-d3a0-4122-bb02-4d0f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4b7-da48-4572-81b1-499502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:52:06", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4b7-cfe0-44cd-b8cf-4d9d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d1784ba3-1ef0-4d79-8079-c9dc92251090", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:10.000Z", "modified": "2018-03-13T13:40:10.000Z", "pattern": "[file:hashes.MD5 = 'a494c62d136444826d33af373c59305c' AND file:hashes.SHA1 = '31082b96d15f45cc5408ad044ba03191a4bab937' AND file:hashes.SHA256 = '903b1d2fc5f0fd013506915bf31dccf18f96a12efbfa89fa0f27410b98197518']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--122ea312-54ee-42c9-9246-5a1b4c5d6e9d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:09.000Z", "modified": "2018-03-13T13:40:09.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/903b1d2fc5f0fd013506915bf31dccf18f96a12efbfa89fa0f27410b98197518/analysis/1520439877/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4b9-2ad4-439f-a514-4cc902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "26/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4b9-9f58-4b04-a8e5-401a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:24:37", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4b9-ce2c-415f-9529-495302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f30501a4-1ca7-4609-957b-15efbfab4c35", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:13.000Z", "modified": "2018-03-13T13:40:13.000Z", "pattern": "[file:hashes.MD5 = '2938c7b076107ec91b55067eb4d46a36' AND file:hashes.SHA1 = '9cc180d0c4da14cf4458f2f493401b8a7127f265' AND file:hashes.SHA256 = 'ad5c791ae004cbb1aea0a71fe2f8bc014cba005e8a20e16042dd4f41169dede0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d9686b2d-97a4-4279-908e-a465007070a0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:11.000Z", "modified": "2018-03-13T13:40:11.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ad5c791ae004cbb1aea0a71fe2f8bc014cba005e8a20e16042dd4f41169dede0/analysis/1520440417/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4bb-dcd0-46a7-83cc-4f7402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4bc-8a74-4e27-9997-471e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:33:37", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4bc-1794-4145-9b3f-4f8502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6f94cdef-c5a9-409d-9fa3-8a13133ff47f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:15.000Z", "modified": "2018-03-13T13:40:15.000Z", "pattern": "[file:hashes.MD5 = '20bbe0b3c44e4a1c22f477cc307cd692' AND file:hashes.SHA1 = 'e20eab5e4cd632697a7cac30ce2a52647ae2fba4' AND file:hashes.SHA256 = '5e3b091d32b67cff249bb8667e12b6adb3c9f3315fa4d0e6e0af0924fa5306ff']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4012a76c-de18-4390-a286-2c83696b393d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:14.000Z", "modified": "2018-03-13T13:40:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5e3b091d32b67cff249bb8667e12b6adb3c9f3315fa4d0e6e0af0924fa5306ff/analysis/1520906580/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4be-3fb4-4888-87e8-493002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4be-d138-4822-bb4f-470002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 02:03:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4be-ac84-46db-a1b7-4b1302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4b6c97d5-3fe1-4419-bf6b-f179e663bcd1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:18.000Z", "modified": "2018-03-13T13:40:18.000Z", "pattern": "[file:hashes.MD5 = '3fa8aff4bee5e496da00a7d7016ebded' AND file:hashes.SHA1 = '0180058cec0053a7fde6136f36d1c4acb58ddbc5' AND file:hashes.SHA256 = '275136e4983e309d584ec088ee369634b3761fef163a8e6cce709699775d9ac9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9fa6c908-2ff0-4298-aa58-9fed29b6621c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:16.000Z", "modified": "2018-03-13T13:40:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/275136e4983e309d584ec088ee369634b3761fef163a8e6cce709699775d9ac9/analysis/1520376509/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4c0-2d68-4ab4-ba64-491902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4c1-cee4-4898-8643-48eb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:29", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4c1-b8b0-4289-8fdc-4f1e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5f5a9bef-cbc2-4048-a584-02fe6b323301", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:21.000Z", "modified": "2018-03-13T13:40:21.000Z", "pattern": "[file:hashes.MD5 = '2c90625f84a51b57e75049beee698252' AND file:hashes.SHA1 = 'a1cb2dfc25dcaa41ecf093c85187f25aec2f6227' AND file:hashes.SHA256 = 'fe18a882867fd6725bc5c3afc0f8b7e9a81383d7c8baf30dec362c4eb2c95ccb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d4ce528e-6e53-4462-8b4d-bf43bcf7a122", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:19.000Z", "modified": "2018-03-13T13:40:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/fe18a882867fd6725bc5c3afc0f8b7e9a81383d7c8baf30dec362c4eb2c95ccb/analysis/1517406490/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4c3-5e90-4a3f-8151-4f8e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "25/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4c3-d71c-46d0-9584-4af602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-31 13:48:10", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4c3-b8e8-4e77-84c7-4fae02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3c44b011-cea0-49e8-b582-fad55d1d8af1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:23.000Z", "modified": "2018-03-13T13:40:23.000Z", "pattern": "[file:hashes.MD5 = '12bd99e213dde873df85220a804b7074' AND file:hashes.SHA1 = '5cbccc5f682dff953ab270449420ce74324473c7' AND file:hashes.SHA256 = '60fe04943eb87375122a70d1672722e7700394c5d7427660bae1c44d902e2017']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d9f6f916-1093-437b-9010-23a6d7ba2770", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:21.000Z", "modified": "2018-03-13T13:40:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/60fe04943eb87375122a70d1672722e7700394c5d7427660bae1c44d902e2017/analysis/1520376442/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4c5-b910-4ce1-9902-4e4902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4c5-8008-487a-81bc-41f102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:22", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4c5-ac04-4804-856f-4d7802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--262143f5-8e2c-48f0-a7ff-98463168dc27", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:25.000Z", "modified": "2018-03-13T13:40:25.000Z", "pattern": "[file:hashes.MD5 = '223b43c3adf88f89c86c1f1e6da1d2e3' AND file:hashes.SHA1 = '80ddd53193e956dfdace98b42e3d085ec94c7edd' AND file:hashes.SHA256 = 'f85cdff7982cdd06bfd1deea928678ebc6d83625a2f5090f094153312e914849']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b1bd6e18-7266-4a67-b549-1177d939703d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:23.000Z", "modified": "2018-03-13T13:40:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f85cdff7982cdd06bfd1deea928678ebc6d83625a2f5090f094153312e914849/analysis/1520441449/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4c7-b24c-4ef3-984e-4dcb02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4c8-5ae0-4ecb-9831-426202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:50:49", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4c8-e5a0-4a99-8e5f-481502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4778b0bb-ca98-4bd7-8f8a-5d408f3cff9e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:27.000Z", "modified": "2018-03-13T13:40:27.000Z", "pattern": "[file:hashes.MD5 = '11a2845638b2617c96c091134d3623d3' AND file:hashes.SHA1 = 'ee543915a0f55982623e03ebc2494643aa035bc4' AND file:hashes.SHA256 = '34f6bf5de0b379b5cc3218c3b81c23fa590ebbe4488d35fdb5ba241ce6d3811b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4006abea-7694-4809-ad2f-f5b1d0b8648a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:25.000Z", "modified": "2018-03-13T13:40:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/34f6bf5de0b379b5cc3218c3b81c23fa590ebbe4488d35fdb5ba241ce6d3811b/analysis/1520438084/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4ca-2b90-4bca-9a11-4d7502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4ca-f6a0-44d2-9b99-42f002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:54:44", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4ca-c07c-4531-ba51-4a0e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c8f23cd0-337b-4520-b4d3-c7b053601507", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:30.000Z", "modified": "2018-03-13T13:40:30.000Z", "pattern": "[file:hashes.MD5 = '2d49df6e7d6c465eee74cc77badd45db' AND file:hashes.SHA1 = 'b26bf9cd64dd74e1be47772d4ece92d2b0be745e' AND file:hashes.SHA256 = '0390956e3c62dad776147b6661fc5dbcd8d585027f7fd530e7b0428007b43197']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--17da1ccf-d4c1-4428-8404-8d3659d59793", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:28.000Z", "modified": "2018-03-13T13:40:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0390956e3c62dad776147b6661fc5dbcd8d585027f7fd530e7b0428007b43197/analysis/1513807882/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4cc-31b0-46ac-a58a-4b5402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "43/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4cc-f5b0-48dd-b61d-41bd02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-20 22:11:22", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4cc-5ec0-441f-b401-409c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b01eed1e-c2f3-4a55-ae9e-c38e8d385f0a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:32.000Z", "modified": "2018-03-13T13:40:32.000Z", "pattern": "[file:hashes.MD5 = 'a7efde4e103890f2974ab7e9eab9d1c2' AND file:hashes.SHA1 = '9f9d34ff665c799ae2ec996796f5f7b18d7500f8' AND file:hashes.SHA256 = 'bb06ec141b6382a111c20c70898b161f2287dda44a7024b949cc91fab1d3ca62']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b544c25d-094a-4b2b-a6dd-14b6ace52836", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:30.000Z", "modified": "2018-03-13T13:40:30.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/bb06ec141b6382a111c20c70898b161f2287dda44a7024b949cc91fab1d3ca62/analysis/1520440866/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4ce-f644-4ca2-8a02-43b902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4cf-6380-45d7-a64b-41d702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:41:06", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4cf-76d0-46f4-b045-481502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7fe8a7d6-0855-42f6-9a14-b2824acfb3b4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:34.000Z", "modified": "2018-03-13T13:40:34.000Z", "pattern": "[file:hashes.MD5 = '8da11c7503a0054f90db43dd73dda94b' AND file:hashes.SHA1 = '4147d86b5939bf8e77e2126c8edc64f573bc1c36' AND file:hashes.SHA256 = 'd11b980ada1634b17462c05c4f2ade8894f2267b254038aa27fddbf2e2f4c850']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--42755064-ba05-4f91-b78f-689be27b717e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:32.000Z", "modified": "2018-03-13T13:40:32.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d11b980ada1634b17462c05c4f2ade8894f2267b254038aa27fddbf2e2f4c850/analysis/1516110549/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4d1-149c-4d4f-a6b2-447502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4d1-5ba0-43cc-9490-462f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-16 13:49:09", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4d1-a628-4a08-b1c9-49a502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7515eaf4-b764-46a3-b4bb-a9dd4669c17e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:36.000Z", "modified": "2018-03-13T13:40:36.000Z", "pattern": "[file:hashes.MD5 = '5250498499d2bf02620df74117baf476' AND file:hashes.SHA1 = '9f1c2ba4061f9e527f85c1aa0573c9577f82a3fb' AND file:hashes.SHA256 = 'e985205932309edce7ea1130d1a3ba169a8b9b5a84c890e01633e45aa7b76e0e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fc459030-58b1-4629-8287-71eb17a46f1f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:35.000Z", "modified": "2018-03-13T13:40:35.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e985205932309edce7ea1130d1a3ba169a8b9b5a84c890e01633e45aa7b76e0e/analysis/1520913607/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4d3-0b60-4257-82db-440902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4d3-d078-4ea5-964a-4abf02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 04:00:07", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4d3-4034-4649-b9dd-407e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0c710fd7-5c24-4156-80af-9ce1133f1b34", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:39.000Z", "modified": "2018-03-13T13:40:39.000Z", "pattern": "[file:hashes.MD5 = '9287dd4943e726a2b0ac709e316c32c3' AND file:hashes.SHA1 = '930b443b254184694da7d588bddff205c884e47f' AND file:hashes.SHA256 = '8d0aae0b927fcf6e3162d95b1038fac8281432f4f94fc294472ad3d7d1457929']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--59ee90d1-bae4-42a5-9686-5f2ad4cb8007", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:37.000Z", "modified": "2018-03-13T13:40:37.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8d0aae0b927fcf6e3162d95b1038fac8281432f4f94fc294472ad3d7d1457929/analysis/1520439772/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4d5-6e38-465e-97d8-4c1802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4d6-c23c-4590-a7d3-439302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:22:52", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4d6-9484-4d92-a7a5-48eb02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1f4e9c0c-d4b9-4b41-b50e-95a86e12635f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:41.000Z", "modified": "2018-03-13T13:40:41.000Z", "pattern": "[file:hashes.MD5 = 'bcb8916f215dab1aca9eeff0092ebf4f' AND file:hashes.SHA1 = '542a1d3459350c9086f66ae87e561d9fcfcfcafc' AND file:hashes.SHA256 = '0084b71d5f3c558f05d887cd2843e6d15b77924144beb619e75e9be445d326c4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c60414fe-d8a1-485f-b326-ec39137346c4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:39.000Z", "modified": "2018-03-13T13:40:39.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0084b71d5f3c558f05d887cd2843e6d15b77924144beb619e75e9be445d326c4/analysis/1520376413/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4d7-a338-42e8-9869-4e6f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4d8-e2d8-40b5-8dd9-4fe202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:46:53", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4d8-6cd0-4a34-b571-456b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--772a44aa-5648-43da-ae46-a43b0e51dede", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:43.000Z", "modified": "2018-03-13T13:40:43.000Z", "pattern": "[file:hashes.MD5 = '6e1e89c787c27e62567cc32ef684e013' AND file:hashes.SHA1 = '6c02d3acaafdb4f9765f062354bd6f226694f48a' AND file:hashes.SHA256 = 'fc88d645f9885abf4274e7ed18e555447da13ef2c88082fdf904c3b869ab2854']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8076f407-c7c6-42e5-9901-5ea7dca9e02c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:41.000Z", "modified": "2018-03-13T13:40:41.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/fc88d645f9885abf4274e7ed18e555447da13ef2c88082fdf904c3b869ab2854/analysis/1520441555/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4da-e22c-4ac5-ae04-44db02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4da-41c4-438d-968e-4d1802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:52:35", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4da-3240-4705-bf33-409702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3842366a-678d-443f-83ba-e2523a409506", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:45.000Z", "modified": "2018-03-13T13:40:45.000Z", "pattern": "[file:hashes.MD5 = '6d64c1e20c8953304a76f313f0e36e8e' AND file:hashes.SHA1 = 'a83d6c9f14f0e5104492498fb98e91096ec9b9a0' AND file:hashes.SHA256 = 'b82fd4927cc9347513227a8b8d0a206a4678461b16c3acb5f6add2e5d1f089dd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0c7561b8-109e-4cde-85ee-0c5ceaa66987", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:44.000Z", "modified": "2018-03-13T13:40:44.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b82fd4927cc9347513227a8b8d0a206a4678461b16c3acb5f6add2e5d1f089dd/analysis/1520440709/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4dc-05d0-4750-aa58-49c502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4dc-eca0-4d7f-bb9e-488802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:38:29", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4dc-6e68-40cf-9102-445402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6e33ec1b-4c4b-4ff2-9df3-e0ef2cf0d557", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:48.000Z", "modified": "2018-03-13T13:40:48.000Z", "pattern": "[file:hashes.MD5 = '350b607bad40d521cbfffcba0023d432' AND file:hashes.SHA1 = '1e733b782ae647c79e0097a3f1c150f4ecb7f863' AND file:hashes.SHA256 = 'c068b9246a31d99b810b253b7e92695108bcf27d253de4e4ac0aed3ab02e83ab']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--68bfceef-61e7-40b2-8baf-9191f74d200c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:46.000Z", "modified": "2018-03-13T13:40:46.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/c068b9246a31d99b810b253b7e92695108bcf27d253de4e4ac0aed3ab02e83ab/analysis/1520440945/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4de-208c-44ea-87a1-406002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4de-8798-4369-92ad-4f2b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:42:25", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4de-3778-49cf-87dd-454502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b41008c1-0bec-4725-b8fa-fb41541dedc0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:50.000Z", "modified": "2018-03-13T13:40:50.000Z", "pattern": "[file:hashes.MD5 = '01e8b8184f594ea70148ef453439a3cc' AND file:hashes.SHA1 = '775caca6da0c4afd6359b22beb2fb7a7e2ded241' AND file:hashes.SHA256 = '4949af73035869e28552272ed9c79511027ef026cb79d065f0775b50e1e5008b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e7aedbef-df58-4fa7-b32a-34eb2c0ed4e5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:48.000Z", "modified": "2018-03-13T13:40:48.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4949af73035869e28552272ed9c79511027ef026cb79d065f0775b50e1e5008b/analysis/1520376435/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4e0-a1cc-4437-8be6-481c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4e1-781c-46cb-ba42-4df002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:15", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4e1-3418-4844-8815-42db02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a0ff86b1-25e6-4093-8971-dccc063f05a8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:52.000Z", "modified": "2018-03-13T13:40:52.000Z", "pattern": "[file:hashes.MD5 = 'c507c9bf763fa29ecce8b09e2987707d' AND file:hashes.SHA1 = '0d0ba39278fe0baea8c5b58777c98d9ec7dc8de6' AND file:hashes.SHA256 = 'a0cf68c10d1d9ce0e73208e6e6bad32b2405d2c74c662dc7b20f9b567c4dda64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--724bc7ba-ba88-4e5d-9c40-7676621f8735", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:50.000Z", "modified": "2018-03-13T13:40:50.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a0cf68c10d1d9ce0e73208e6e6bad32b2405d2c74c662dc7b20f9b567c4dda64/analysis/1520440202/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4e2-b6a0-4e77-b68f-41c002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4e3-bbd4-4125-8625-43de02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:30:02", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4e3-7780-4791-8f2b-440e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1373fe1f-de01-4475-915b-6851db2f39e4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:54.000Z", "modified": "2018-03-13T13:40:54.000Z", "pattern": "[file:hashes.MD5 = 'c2ac177a2399449ba13389429fc9b44a' AND file:hashes.SHA1 = '6c1b558e91ad4e48f2d6f4b997a52100d3648d24' AND file:hashes.SHA256 = 'ec58ed473d3c8fc3d6f4430930359436771de9291d58b30d67b333ef01d59dba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fc7f1e60-0b74-422a-809b-d51ccf402c0e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:52.000Z", "modified": "2018-03-13T13:40:52.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ec58ed473d3c8fc3d6f4430930359436771de9291d58b30d67b333ef01d59dba/analysis/1514987186/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4e4-6384-4a10-8b29-4be602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4e5-d9c4-45e1-8978-4cda02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 13:46:26", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4e5-1538-42a3-bf76-48c502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c45f14db-dfbd-4555-b390-2276e6ff1ad2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:56.000Z", "modified": "2018-03-13T13:40:56.000Z", "pattern": "[file:hashes.MD5 = '9e9019bf73721932fae204e518434f9a' AND file:hashes.SHA1 = '615223858659a63d29e41606003fc2c099d24bf3' AND file:hashes.SHA256 = 'c4313ab89c3d94ab70185df327c664379490b263d47057543a5d7ab40e2ee588']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fae7c364-8729-429b-9ea9-3b31af0f3ea5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:55.000Z", "modified": "2018-03-13T13:40:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/c4313ab89c3d94ab70185df327c664379490b263d47057543a5d7ab40e2ee588/analysis/1515072964/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4e7-4728-4ff5-bcac-475802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "27/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4e7-a548-42c7-868c-4e9802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-04 13:36:04", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4e7-bbb0-4ce1-a9fb-4e3d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56a2d91c-c23b-4c5e-b2e3-921244e87225", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:59.000Z", "modified": "2018-03-13T13:40:59.000Z", "pattern": "[file:hashes.MD5 = '2890d76aa512202353fb48e6b8107114' AND file:hashes.SHA1 = '8d143d2ae24883e6fa7c6b9da3b42081ebb8329a' AND file:hashes.SHA256 = 'e685b870f436c8bf4eda02666b99c02631ca165e90a122347929f3e1fff6dbe0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:40:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1e6b86c2-a47c-487a-9f37-325383622e1d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:57.000Z", "modified": "2018-03-13T13:40:57.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e685b870f436c8bf4eda02666b99c02631ca165e90a122347929f3e1fff6dbe0/analysis/1520823924/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4e9-5f24-497f-8729-45d602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4e9-0f5c-4b78-87ac-455702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 03:05:24", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4e9-f098-4b46-998d-412a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6d17c059-317b-40e2-9085-4f8286e2d10e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:01.000Z", "modified": "2018-03-13T13:41:01.000Z", "pattern": "[file:hashes.MD5 = '12b22e4f0733f2b4b9804ac3bb8e4a5a' AND file:hashes.SHA1 = '2f6ff9751a790141c0e2e3b82f5dbc6e840594e9' AND file:hashes.SHA256 = 'f47750218afdebc37ae9462356dd5a1209a238e4228dd10001641211b91862ac']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--00d27731-8a04-43ba-944f-d93082b05bce", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:40:59.000Z", "modified": "2018-03-13T13:40:59.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f47750218afdebc37ae9462356dd5a1209a238e4228dd10001641211b91862ac/analysis/1520376493/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4eb-634c-495f-a5da-402c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4ec-ebbc-4464-9235-4cdd02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:13", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4ec-c8b0-4084-91e2-421c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a5a9364c-78a9-48e7-9960-74cafd72c762", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:03.000Z", "modified": "2018-03-13T13:41:03.000Z", "pattern": "[file:hashes.MD5 = 'da5bdce11de8a58d3bef93de0f066dba' AND file:hashes.SHA1 = '4b1e57aa7b60f61a898ab6aa48f79a44b9ebea6a' AND file:hashes.SHA256 = '710439f33705307e2cde051bbdf446acfad8fd94a14be5c75b8350006b3a8d6a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8812bcfd-652a-48f9-8ce0-d0859f8a7d74", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:01.000Z", "modified": "2018-03-13T13:41:01.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/710439f33705307e2cde051bbdf446acfad8fd94a14be5c75b8350006b3a8d6a/analysis/1520488499/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4ed-bb40-4ec6-9ca9-4a7702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4ee-ac20-487c-b601-475102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:54:59", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4ee-0f5c-44bd-b5e5-49ed02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cfdebb5e-9bed-4110-91e1-967541c218d5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:05.000Z", "modified": "2018-03-13T13:41:05.000Z", "pattern": "[file:hashes.MD5 = 'fc949f50f21a5dfeb2eb63f9b179c5cf' AND file:hashes.SHA1 = '74276cd1fec8cb5da1bd2cb6f59c9bb985aa6168' AND file:hashes.SHA256 = '04a320fac7e255e0cc08635abae96241944d9f0ecd0d57953447c7616ad9fbe8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--088a12ae-cb7c-4e19-bf34-de6c31c42421", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:04.000Z", "modified": "2018-03-13T13:41:04.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/04a320fac7e255e0cc08635abae96241944d9f0ecd0d57953447c7616ad9fbe8/analysis/1512766103/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4f0-46a4-4d03-8373-4c8202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4f0-f890-4054-8951-42f502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-08 20:48:23", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4f0-ec18-4ef7-a116-400502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8cfdb710-e0eb-4aa0-be7f-4bef7c057f48", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:08.000Z", "modified": "2018-03-13T13:41:08.000Z", "pattern": "[file:hashes.MD5 = '1a292f55814ef9e1f70049df9334fb57' AND file:hashes.SHA1 = '93ce5a6a664312b6486d000077fcdebe3fbddb9a' AND file:hashes.SHA256 = 'd8f73e616842ea745a15959c217dd383dd41cd0f706035759d40e5ea1ffdacce']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--50d32b71-58f6-49bd-950c-8201f8c8f6a0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:06.000Z", "modified": "2018-03-13T13:41:06.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d8f73e616842ea745a15959c217dd383dd41cd0f706035759d40e5ea1ffdacce/analysis/1514997354/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4f2-a020-4c89-991f-4eba02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4f2-750c-41c7-bd2c-4ff202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 16:35:54", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4f2-d198-488d-8414-49cb02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0ee0151f-da7d-4d9f-8d67-74dc297b1ac7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:10.000Z", "modified": "2018-03-13T13:41:10.000Z", "pattern": "[file:hashes.MD5 = '7fd32b557b1b11061bce4689b0a8e437' AND file:hashes.SHA1 = 'a0cbe4f7f0feb2d9154e74c94ffa48f7ecd27899' AND file:hashes.SHA256 = '8697c6d9c186cbbab22974817f957fb41cb8b288667e7c38c6df981cb3386f5d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--afef20ad-8f41-41fd-ab24-c13d4bb81db2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:08.000Z", "modified": "2018-03-13T13:41:08.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8697c6d9c186cbbab22974817f957fb41cb8b288667e7c38c6df981cb3386f5d/analysis/1520439664/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4f4-b30c-4555-948b-405e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4f5-14b0-4261-bdf4-42db02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:21:04", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4f5-c9b0-48ab-8022-47fb02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--66c51f09-728f-4bbc-a2f0-8fd2dd9ee34c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:12.000Z", "modified": "2018-03-13T13:41:12.000Z", "pattern": "[file:hashes.MD5 = 'bea76d96c3e5b8c37c9b962079e63110' AND file:hashes.SHA1 = '64a25529d4d2fc328a9b1e1baed92a008b04f55c' AND file:hashes.SHA256 = '9ad3cbe820b31d27dca4c28d56ba3654735e7d1d00b091167fb1a8d9ac0dd31c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--94c29569-4c2f-4eca-83ea-71b34b2f04ac", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:10.000Z", "modified": "2018-03-13T13:41:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9ad3cbe820b31d27dca4c28d56ba3654735e7d1d00b091167fb1a8d9ac0dd31c/analysis/1515544166/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4f7-a37c-4ac4-93e5-455602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4f7-1294-49e5-b8c8-421302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-10 00:29:26", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4f7-a668-451e-bd18-4e8b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8ba4601c-07fc-4c31-b409-70f55daec9da", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:14.000Z", "modified": "2018-03-13T13:41:14.000Z", "pattern": "[file:hashes.MD5 = '7281036c082981f71602a4b4116b984a' AND file:hashes.SHA1 = 'f7a1e36729126ce981ab0e022a28c4bf8332b140' AND file:hashes.SHA256 = '85962b40ad53bbcb04bc9536bbab5244142b6239f972cfffd43d3c6f7956849c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e0e6c464-9727-4e62-99a8-d2d896ef3be0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:13.000Z", "modified": "2018-03-13T13:41:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/85962b40ad53bbcb04bc9536bbab5244142b6239f972cfffd43d3c6f7956849c/analysis/1519220697/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4f9-d188-474f-9e06-41c502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "22/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4f9-493c-40e7-a74f-46a802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-21 13:44:57", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4f9-abb4-4f72-9d10-45bd02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c7f95bca-d452-4ca5-b2fd-81284eefa29a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:17.000Z", "modified": "2018-03-13T13:41:17.000Z", "pattern": "[file:hashes.MD5 = '10a9c65499b1921019f9704b9d461f5a' AND file:hashes.SHA1 = 'f6229c6a1b417d24451b86e7d40318f221d53b32' AND file:hashes.SHA256 = '901354b147cba30d916c0dc57a74fd24cfb44c20bcbe950aaff3e32856ea220e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--95bd6a8c-2c13-44dc-a176-04b903e55468", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:15.000Z", "modified": "2018-03-13T13:41:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/901354b147cba30d916c0dc57a74fd24cfb44c20bcbe950aaff3e32856ea220e/analysis/1520910540/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4fb-1f24-448c-9cdd-48f102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4fb-e054-442d-98ba-496302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:09:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d4fb-cab8-4516-864d-475102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--895e6d73-cc04-4d7d-a74f-1c79d68cc85d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:19.000Z", "modified": "2018-03-13T13:41:19.000Z", "pattern": "[file:hashes.MD5 = '4679c554b4fe83ded9305a4774a177de' AND file:hashes.SHA1 = 'ab45a3be4eea07f956755716d70578e607fc47e0' AND file:hashes.SHA256 = '92bf654e3cc50af479468180a3ee520bc13f979c9e50b18886cabcea09b1220e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ba96f218-b01d-4fb3-986e-4a4b129d501a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:17.000Z", "modified": "2018-03-13T13:41:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/92bf654e3cc50af479468180a3ee520bc13f979c9e50b18886cabcea09b1220e/analysis/1520376530/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d4fd-a4a0-4648-a06e-48a502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4fe-fa3c-4866-92f6-41c702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:50", "category": "Other", "comment": "Executable File", "uuid": "5aa7d4fe-adbc-48b5-bff5-4cf202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a18a3d72-f1c0-40f0-9281-25c93d8002c7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:21.000Z", "modified": "2018-03-13T13:41:21.000Z", "pattern": "[file:hashes.MD5 = '11cdffa4a67149553f9b77956a10e2a5' AND file:hashes.SHA1 = '9ee8dd0f64c5586cc23848823b2638fb2d6a4170' AND file:hashes.SHA256 = '18de35862022570015788dac8f5f60d47bbdf7922e5b75da278828eac1d9cafb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d673e058-bd6f-4588-b64a-5f26648b833f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:19.000Z", "modified": "2018-03-13T13:41:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/18de35862022570015788dac8f5f60d47bbdf7922e5b75da278828eac1d9cafb/analysis/1520437577/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d4ff-c3b0-416c-b8a7-43a202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d500-7598-4b23-9ce7-44ef02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:46:17", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d500-85f4-42ea-907e-46c802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1a981d65-59bc-4a14-81a1-008f4c77159a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:23.000Z", "modified": "2018-03-13T13:41:23.000Z", "pattern": "[file:hashes.MD5 = '36027b6b489adcbbd12dc845f193cf37' AND file:hashes.SHA1 = '342d96b456046c71cf7371d64bc8c07d77edacf1' AND file:hashes.SHA256 = 'd10f6ae7735ec1767efb756a14aa8f45d3d0b926787eb6e682ae85a4f2e5f5af']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ad7412ca-ba99-4dc1-9098-1b14d7898562", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:22.000Z", "modified": "2018-03-13T13:41:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d10f6ae7735ec1767efb756a14aa8f45d3d0b926787eb6e682ae85a4f2e5f5af/analysis/1519360656/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d502-9308-42bb-9946-42a602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d502-e190-4497-959c-404902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-23 04:37:36", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d503-f8f4-4360-8576-46b702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f6601087-35c3-4239-85b2-25f4a4c9c1f0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:26.000Z", "modified": "2018-03-13T13:41:26.000Z", "pattern": "[file:hashes.MD5 = '5f71d4dd75b0495a8457d8a70c33fa28' AND file:hashes.SHA1 = '2be2d3f434748a5679cb9b4dcbd107c7a3645193' AND file:hashes.SHA256 = '2811f5cd04ee2907fb8d00e88a40dd32d95fb2c8223ed490d578c44cda923608']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f1915336-fa1d-4500-931f-5368fbc727d4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:24.000Z", "modified": "2018-03-13T13:41:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/2811f5cd04ee2907fb8d00e88a40dd32d95fb2c8223ed490d578c44cda923608/analysis/1515001559/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d504-1350-4368-ba47-4adb02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d505-6724-4ebe-a8a9-410302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 17:45:59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d505-2ffc-4ba6-b300-4e2602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--abf60cec-d36a-4744-b7a1-a33e5763a9c4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:28.000Z", "modified": "2018-03-13T13:41:28.000Z", "pattern": "[file:hashes.MD5 = 'bfa58f9ec10a546b96494acd73424806' AND file:hashes.SHA1 = 'dab5b0613e223be2c1379f23bd0d2f17786bbb93' AND file:hashes.SHA256 = 'b06eb80d956774cb2ef9a38ee6c2a5af34729f575c80ba6af4bf6e501497fc0c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--32ea0688-10d4-4123-b4c6-d68fb5cc55d4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:26.000Z", "modified": "2018-03-13T13:41:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b06eb80d956774cb2ef9a38ee6c2a5af34729f575c80ba6af4bf6e501497fc0c/analysis/1517591897/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d506-d368-4398-9c03-4cd202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d507-7784-4306-90c5-4bcd02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-02 17:18:17", "category": "Other", "comment": "Executable File", "uuid": "5aa7d507-13e0-442e-aad0-4a1802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a8aecb74-f7d5-4f56-9dc7-3c00ba2f4b0d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:30.000Z", "modified": "2018-03-13T13:41:30.000Z", "pattern": "[file:hashes.MD5 = '756207a2669097ba1376a11030aeb0ef' AND file:hashes.SHA1 = 'e85d475bad6b36cea50b1e25a6cb26a5a0cbef9d' AND file:hashes.SHA256 = 'cf35ce413d812c79d61fb6e30aacb203ab23c253d7cbef28941f92923aaf6aea']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f355561d-a7fa-4896-be8c-1f8274815354", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:29.000Z", "modified": "2018-03-13T13:41:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cf35ce413d812c79d61fb6e30aacb203ab23c253d7cbef28941f92923aaf6aea/analysis/1520908620/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d509-db80-4ed0-b708-4b1802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/64", "category": "Other", "comment": "Executable File", "uuid": "5aa7d509-d344-43da-9b77-4ec302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 02:37:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d509-6628-42d9-b769-446502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a9d8f073-dd7a-4e9b-a0a7-04598ce32926", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:33.000Z", "modified": "2018-03-13T13:41:33.000Z", "pattern": "[file:hashes.MD5 = '4c55d5d3acf1ae94b10c7d9f5d1e3937' AND file:hashes.SHA1 = 'ef9b0590f4ed5c8e80daf5840b22d5cc44fa6cf7' AND file:hashes.SHA256 = '30459539ca6f322c7f8a395092211df50361e834c5da0e3734c62eacf69afaad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--10380065-18d9-4ca8-8cb4-dad38fdd929d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:31.000Z", "modified": "2018-03-13T13:41:31.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/30459539ca6f322c7f8a395092211df50361e834c5da0e3734c62eacf69afaad/analysis/1520376510/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d50b-a920-4f4a-bf47-441602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d50b-6514-4be4-9488-43f402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:30", "category": "Other", "comment": "Executable File", "uuid": "5aa7d50b-940c-44e1-943b-431002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7638c728-3089-4a20-af0a-b37900bc1f1d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:35.000Z", "modified": "2018-03-13T13:41:35.000Z", "pattern": "[file:hashes.MD5 = '5e2368598233ac6c6e89f16c75d44165' AND file:hashes.SHA1 = 'efa3de8d9ef8e4aeddcf7fe93b71cfa5add5789f' AND file:hashes.SHA256 = '9884d3287d3be69a0d06c6fd414d828b0036106580f212e39b6adbbddace2010']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--86f66db8-becb-45ae-b0f3-e3340cd5d19a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:33.000Z", "modified": "2018-03-13T13:41:33.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9884d3287d3be69a0d06c6fd414d828b0036106580f212e39b6adbbddace2010/analysis/1516389123/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d50d-30f8-494d-ac70-4aa002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d50e-e430-473c-b043-46e202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-19 19:12:03", "category": "Other", "comment": "Executable File", "uuid": "5aa7d50e-7854-4e75-a0f9-4d6802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7f886d78-e6f7-4ecd-8828-e9693e314aa0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:37.000Z", "modified": "2018-03-13T13:41:37.000Z", "pattern": "[file:hashes.MD5 = '0376e3c69f05249b29111058b5486701' AND file:hashes.SHA1 = 'fce3c8c9a807c40a67804f0c26d6e4b1fb97e710' AND file:hashes.SHA256 = '4e6f7d50b2c4616421f4e662eec927b9f60dbf720f0e3dea25d9177c56f329e4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0f3c8eab-f129-49da-9ed7-cc8b7f1b09f0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:35.000Z", "modified": "2018-03-13T13:41:35.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4e6f7d50b2c4616421f4e662eec927b9f60dbf720f0e3dea25d9177c56f329e4/analysis/1520376436/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d50f-3bac-41be-a39f-4e7a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d510-7ec4-413b-9156-4c4d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:16", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d510-8a48-438f-8128-4e9402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--51f66ea4-bd23-495b-be2c-64962e187550", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:39.000Z", "modified": "2018-03-13T13:41:39.000Z", "pattern": "[file:hashes.MD5 = '34c66359ea5ae2861b7d253e76478ce2' AND file:hashes.SHA1 = '20212f5365f5ab17adcaeaa6c70512a86014340f' AND file:hashes.SHA256 = 'b6b715982d7674f28e697ab896840d8dc596324351ab5aa21336c597d72d7500']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ff35fc80-aed9-44b8-bf9a-04ae04bb9b29", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:38.000Z", "modified": "2018-03-13T13:41:38.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b6b715982d7674f28e697ab896840d8dc596324351ab5aa21336c597d72d7500/analysis/1508426040/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d512-6de8-4130-b11c-4cfc02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/65", "category": "Other", "comment": "Executable File", "uuid": "5aa7d513-8a40-46d9-9ad7-470202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-10-19 15:14:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d513-811c-4c13-a4e4-457e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--93cdfd6c-153f-458f-8b4d-6d3eea4d85fa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:42.000Z", "modified": "2018-03-13T13:41:42.000Z", "pattern": "[file:hashes.MD5 = 'ea5b8f05a9424599fbc31a53ec17fa9c' AND file:hashes.SHA1 = 'c12097a85c7c29cdeeb6ee29580cb879f3e94f33' AND file:hashes.SHA256 = '10e90d6fce4d5cf1c3f4a9e779547570986c948a7ed2d6cc824c279f73d0589a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--25d08574-096e-4a9b-b9cc-e292aff3160a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:41.000Z", "modified": "2018-03-13T13:41:41.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/10e90d6fce4d5cf1c3f4a9e779547570986c948a7ed2d6cc824c279f73d0589a/analysis/1514997386/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d515-8f50-4376-81b8-43ff02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "38/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d515-1380-417a-a6c0-405402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 16:36:26", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d515-d238-4119-a715-419a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d2244ec7-b833-45ee-b46d-46d0eb8821a6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:44.000Z", "modified": "2018-03-13T13:41:44.000Z", "pattern": "[file:hashes.MD5 = '949cd3e4eb1d8bd59962e83bb44160c7' AND file:hashes.SHA1 = '2a021f8625281add451f212cef427a2a00d34ef3' AND file:hashes.SHA256 = '514f5bf6c530f0baa7697e52dfc22c2199c378765d461c573b26ab9b0cfa71a1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0dd974d2-228a-4efd-9c80-5c3ebec6afe2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:43.000Z", "modified": "2018-03-13T13:41:43.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/514f5bf6c530f0baa7697e52dfc22c2199c378765d461c573b26ab9b0cfa71a1/analysis/1520438593/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d517-5924-4d38-9537-49b102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d517-da28-4c66-9470-4f3b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:03:13", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d517-82c4-41d2-ab65-498402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a252e7e6-4210-4a0e-af70-808685490bf0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:47.000Z", "modified": "2018-03-13T13:41:47.000Z", "pattern": "[file:hashes.MD5 = '0cacb65ec9da1de3c40dc0415e3ebc12' AND file:hashes.SHA1 = '0d2002f4b7132a675ed7513d8a076a621539b466' AND file:hashes.SHA256 = 'cfd3c017a7e9a7a1a1e47a60bdbfde167899caae9da81e5854994a851d9927f4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3fda77bd-6a6a-4fdb-a784-0569bd5b8bc4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:45.000Z", "modified": "2018-03-13T13:41:45.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cfd3c017a7e9a7a1a1e47a60bdbfde167899caae9da81e5854994a851d9927f4/analysis/1514997396/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d519-f430-48c7-b8ea-449c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d519-f21c-4d3d-8874-415102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 16:36:36", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d519-45b8-4691-957b-4caf02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--652791f2-58a3-4bc2-9127-eee90e5777fc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:49.000Z", "modified": "2018-03-13T13:41:49.000Z", "pattern": "[file:hashes.MD5 = '4a1eb3343df894ef4d6c4d63362896ca' AND file:hashes.SHA1 = 'f7fa8cc65e936f5a7d7f62a9b4eeb35d964eaf3e' AND file:hashes.SHA256 = '9032651ccf32fa0acad949d32bacd2220582ac13c364033641413457dbb3b3b9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--245b7bed-15e3-4235-86bd-27e0d9bc6c46", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:47.000Z", "modified": "2018-03-13T13:41:47.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9032651ccf32fa0acad949d32bacd2220582ac13c364033641413457dbb3b3b9/analysis/1520376456/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d51b-ccfc-4493-9a48-4f8b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d51c-a124-4765-a0b0-4faf02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:36", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d51c-3b84-4202-97e6-41dc02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bd4872e3-93f3-4a82-85ab-0fef4dc1a473", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:51.000Z", "modified": "2018-03-13T13:41:51.000Z", "pattern": "[file:hashes.MD5 = 'f2ddf0aed177868e071afcfcaf56e5a5' AND file:hashes.SHA1 = 'e66598e701d212e3f6b09f7fbcba1fd0d5d9d34f' AND file:hashes.SHA256 = '623d2a5e4bc341c96d7b1dbeaa448fe54616d1f2d62c51e46df3d066308fb904']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--47225078-5904-4fc7-96ae-03e630f628e7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:49.000Z", "modified": "2018-03-13T13:41:49.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/623d2a5e4bc341c96d7b1dbeaa448fe54616d1f2d62c51e46df3d066308fb904/analysis/1520438920/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d51d-ad6c-4491-b41c-4e0a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d51e-30f4-4dcd-bfa0-41a102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:08:40", "category": "Other", "comment": "Executable File", "uuid": "5aa7d51e-b9b0-4f97-a9cc-4dc502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7724b584-9fbf-4690-8824-571ca40e8647", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:53.000Z", "modified": "2018-03-13T13:41:53.000Z", "pattern": "[file:hashes.MD5 = 'e518dd168c1c27f81b6125a6d46334b7' AND file:hashes.SHA1 = 'f8e918d282668119c18ad0efacc0ee00bd558998' AND file:hashes.SHA256 = '8af4c02a21385918fbab32079e38bd955dbfd9a3b5cd409668830053a14b07dc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a9700a79-b809-4626-9a0f-1b5e30547578", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:51.000Z", "modified": "2018-03-13T13:41:51.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8af4c02a21385918fbab32079e38bd955dbfd9a3b5cd409668830053a14b07dc/analysis/1518472089/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d520-2bd4-4386-828b-43e202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d520-b14c-4c86-a53f-455902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-12 21:48:09", "category": "Other", "comment": "Executable File", "uuid": "5aa7d520-a960-4e20-82aa-4e2002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eccc55d5-a165-4f16-8dba-993df6d0c16d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:55.000Z", "modified": "2018-03-13T13:41:55.000Z", "pattern": "[file:hashes.MD5 = '13c4f15612d2f0139057223c203b8db1' AND file:hashes.SHA1 = '20caa4eec283accdd8e386bb80267542fd304ce6' AND file:hashes.SHA256 = '05e4dfeb72eb015cacc9f1040d205d7f5205a6d4d29eed5f1221ed1ef0a8061e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c14e1628-941c-43c0-81ef-0b8bf8e8db3e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:55.000Z", "modified": "2018-03-13T13:41:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/05e4dfeb72eb015cacc9f1040d205d7f5205a6d4d29eed5f1221ed1ef0a8061e/analysis/1520586463/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d523-34a8-4c14-a98c-423a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d523-3d18-4069-841b-4dc902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-09 09:07:43", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d524-6e00-4fb6-b1a5-4b8202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--da83d80a-c5b2-4f00-b78f-bd6cea6c47be", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:59.000Z", "modified": "2018-03-13T13:41:59.000Z", "pattern": "[file:hashes.MD5 = '2f50fd400814cd44be23c8db21ceecc1' AND file:hashes.SHA1 = 'cb1b5ebb4263f6334819b29eb0cc47694d49467c' AND file:hashes.SHA256 = 'ad0f1d6393747a394353e830b3d0c89dd3cd8c4a8c1bab1064451cae5a4a1b36']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:41:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e7be8927-c465-4b2e-bfcc-68a41eae297a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:41:57.000Z", "modified": "2018-03-13T13:41:57.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ad0f1d6393747a394353e830b3d0c89dd3cd8c4a8c1bab1064451cae5a4a1b36/analysis/1520851920/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d525-6c7c-4be6-8cb1-436602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d526-ce2c-40e9-a8a7-43d602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 10:52:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d526-e95c-4041-a213-49cb02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--de30c258-e3ff-4103-90f0-66b263006c0b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:01.000Z", "modified": "2018-03-13T13:42:01.000Z", "pattern": "[file:hashes.MD5 = '0d32128c5b6ae94200a79e41384ad7f3' AND file:hashes.SHA1 = '24fc1f5a56fd9542ec8fb63c8c69c76f53b0ecee' AND file:hashes.SHA256 = '423d6adbb47ce64e47944fe07bd22fd1a06e2332f5975b0da329394dcd7a5d3a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c9f224ab-0c81-4deb-9160-85f96bc624c2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:00.000Z", "modified": "2018-03-13T13:42:00.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/423d6adbb47ce64e47944fe07bd22fd1a06e2332f5975b0da329394dcd7a5d3a/analysis/1520912415/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d528-f5a8-42b6-8a21-4f5002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "39/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d529-8fa4-4c9d-a163-440002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:40:15", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d529-2a58-4d9f-afe6-4bae02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e4f6dfdc-fb92-4812-8c6d-91b7548ebadf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:04.000Z", "modified": "2018-03-13T13:42:04.000Z", "pattern": "[file:hashes.MD5 = '08605790892ea70f4c39e41f73456834' AND file:hashes.SHA1 = '53ed4fd89a4a185166f4d661ee82fbb22accf76a' AND file:hashes.SHA256 = '32636046a3a6d97791d0a48ac59dca6c1ee3a030bdc33610c2bef1c726487b9a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f83784d1-6a08-4009-a46e-4aed15ff5dee", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:02.000Z", "modified": "2018-03-13T13:42:02.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/32636046a3a6d97791d0a48ac59dca6c1ee3a030bdc33610c2bef1c726487b9a/analysis/1515002932/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d52a-e850-4bf0-b7fa-449d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d52b-2928-4b2f-a973-47a402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 18:08:52", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d52b-b824-4f69-92c0-457502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a0cdfe2-1650-41fa-ac1f-99afa14cc188", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:06.000Z", "modified": "2018-03-13T13:42:06.000Z", "pattern": "[file:hashes.MD5 = 'ad0ccd17c1700e23912cfc78d319c597' AND file:hashes.SHA1 = '59e1cda361cbe7548c3c9e49d6eecdd8d50abc74' AND file:hashes.SHA256 = '5328e6cc453209eea9a2dc41e0ef19516794a5cebf90c6094acc581b8fbfe966']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b3785c90-1c5f-4739-8cf1-31e946583359", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:05.000Z", "modified": "2018-03-13T13:42:05.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5328e6cc453209eea9a2dc41e0ef19516794a5cebf90c6094acc581b8fbfe966/analysis/1520913600/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d52d-2eec-4877-9123-41b302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d52d-cbd8-475c-9e61-409602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 04:00:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d52d-de34-4e52-8367-49c102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--da10673d-4b03-473f-943b-e68b51a49372", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:09.000Z", "modified": "2018-03-13T13:42:09.000Z", "pattern": "[file:hashes.MD5 = '322a5da5f793a3c364a6e32e8e835975' AND file:hashes.SHA1 = '4a4829655711fbcc2d127fef98cb2c944e66933c' AND file:hashes.SHA256 = '04b7d38fa77396c75adfbb91e7efc725e97bbe673f575b42862031c1039dbdd2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c0f2a053-934c-4be9-ad1d-7249dfef9301", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:07.000Z", "modified": "2018-03-13T13:42:07.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/04b7d38fa77396c75adfbb91e7efc725e97bbe673f575b42862031c1039dbdd2/analysis/1518511561/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d52f-39ac-4d10-9435-4ed902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d530-66dc-498f-876e-478702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-13 08:46:01", "category": "Other", "comment": "Executable File", "uuid": "5aa7d530-b9fc-4049-aba8-481702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cb0ffcf7-6e1a-4bc5-b72e-b1c50a4c072a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:11.000Z", "modified": "2018-03-13T13:42:11.000Z", "pattern": "[file:hashes.MD5 = 'e500296c9f1d393f12f50a2728e17cd2' AND file:hashes.SHA1 = 'b7cbf3071bc9495a1c6d1bb088520aa197dd5aec' AND file:hashes.SHA256 = '510d7394bf01f4c836524d08cf7f35bdf15f304e4b7b8287d8759316b275e396']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c0d442d4-72b6-47cb-b4b8-18744a4fd84d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:10.000Z", "modified": "2018-03-13T13:42:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/510d7394bf01f4c836524d08cf7f35bdf15f304e4b7b8287d8759316b275e396/analysis/1517544512/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d532-70f4-43ca-b354-473a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d532-898c-4390-9ee7-455f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-02 04:08:32", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d532-bc5c-4b1c-b247-44ad02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4272cdd1-73f2-4b9a-a8b5-64d3a1d7dfd0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:13.000Z", "modified": "2018-03-13T13:42:13.000Z", "pattern": "[file:hashes.MD5 = '1a453d07485b6cb2c889d2676d4cf67e' AND file:hashes.SHA1 = 'bad636002e12d41fcc6e0f5ca38a5b8879d3d412' AND file:hashes.SHA256 = 'dee5e465fc4959e019cc6e781d4be278997c34a0465fa36825339e12068119c5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--857ca1d6-7992-4e86-9a8a-9baf9005bbd9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:12.000Z", "modified": "2018-03-13T13:42:12.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/dee5e465fc4959e019cc6e781d4be278997c34a0465fa36825339e12068119c5/analysis/1513345277/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d534-5f04-4cd9-8608-4ec802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d534-7770-4dfc-a1c9-4ea702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-15 13:41:17", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d534-5890-4c2d-ba8c-404202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2f2d7190-59a8-4a22-b2af-ac312b91bfe0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:16.000Z", "modified": "2018-03-13T13:42:16.000Z", "pattern": "[file:hashes.MD5 = 'b6396acf9a09c594e9ab140d82f3d049' AND file:hashes.SHA1 = '5e03582d68dc08d555cc787e289f64831712a6b6' AND file:hashes.SHA256 = 'ed43f1d983feb172fcf4b62956428ab6b4410a4cddbc6f02657f00dce2fc3a1c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--df56eb90-6fe6-4dc2-86c7-0c1134d65812", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:14.000Z", "modified": "2018-03-13T13:42:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ed43f1d983feb172fcf4b62956428ab6b4410a4cddbc6f02657f00dce2fc3a1c/analysis/1520441130/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d536-e9a4-4de0-84b4-430a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "27/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d537-9924-4f3c-9025-4a1802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:45:30", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d537-25c8-43c9-a896-4a7002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2701b8c8-6625-4f06-a88f-c78f56165a61", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:18.000Z", "modified": "2018-03-13T13:42:18.000Z", "pattern": "[file:hashes.MD5 = '8e5735a3d15f3b2105095316288280d8' AND file:hashes.SHA1 = '42c52061934623a051e4213e1f2a04fd2957e9fa' AND file:hashes.SHA256 = '210397548a6178ea29fc4567328524b41592cfd60fe1a3db543ef49eb37f0a7d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9f4f8732-0f86-487d-b2f5-1d2d89aef0bd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:16.000Z", "modified": "2018-03-13T13:42:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/210397548a6178ea29fc4567328524b41592cfd60fe1a3db543ef49eb37f0a7d/analysis/1520873280/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d539-fcc4-41e5-8ebc-49a702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d539-2c48-4667-9486-4aee02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 16:48:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d539-3718-4fa7-a00f-40f402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--93b95f15-4cb7-419f-841c-450ac3d2fcf6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:20.000Z", "modified": "2018-03-13T13:42:20.000Z", "pattern": "[file:hashes.MD5 = '4c13ba00fef1d3fa4e94661d2c830c17' AND file:hashes.SHA1 = '0f741307b29f86202ff8f3bc819e24bfe40f20df' AND file:hashes.SHA256 = '620cf704d9930328729fd66be9c83f6db33088199a60a02315110bd757c13ef7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--048e1c5f-6a94-4dd9-bbf7-eda1802b6d9c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:19.000Z", "modified": "2018-03-13T13:42:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/620cf704d9930328729fd66be9c83f6db33088199a60a02315110bd757c13ef7/analysis/1518195991/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d53b-be3c-44cd-ba89-446402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d53b-a90c-4f4a-84ab-476b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-09 17:06:31", "category": "Other", "comment": "Executable File", "uuid": "5aa7d53b-c52c-4c36-999b-40ad02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--be1441ae-b2e5-41ed-abdd-414809f6352f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:23.000Z", "modified": "2018-03-13T13:42:23.000Z", "pattern": "[file:hashes.MD5 = '3df2138116d2fedafb91816cd7167012' AND file:hashes.SHA1 = 'd938099905038f767c2492672f489e5e66b8c39c' AND file:hashes.SHA256 = '904285c01b8b7fda39b5ffdad48101a2fb3c2ea82bc47d480383bf11ce926c7c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3741aec9-519d-4649-ad8a-549d2450e256", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:21.000Z", "modified": "2018-03-13T13:42:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/904285c01b8b7fda39b5ffdad48101a2fb3c2ea82bc47d480383bf11ce926c7c/analysis/1520913593/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d53d-dae8-452c-9331-42a602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d53e-f608-47e8-9c7f-402402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:59:53", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d53e-eb10-46cf-b8fe-4ba302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f231a6ea-f8b4-43f8-adac-96e31854da2c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:25.000Z", "modified": "2018-03-13T13:42:25.000Z", "pattern": "[file:hashes.MD5 = '52c2197dbaff94934786b3fc6c22f1f7' AND file:hashes.SHA1 = 'd75579b47a545919affc7de96a50ff6a1e81a1b2' AND file:hashes.SHA256 = '644bab0b1aee8016d3c11a5112b80f7d9522203bbfb9b04218a13c95920aa185']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e5f7cc1c-cd7e-49f5-9d23-96945164180e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:23.000Z", "modified": "2018-03-13T13:42:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/644bab0b1aee8016d3c11a5112b80f7d9522203bbfb9b04218a13c95920aa185/analysis/1520904120/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d540-ff24-45e7-b675-4cef02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d540-8208-4582-aa5c-414502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 01:22:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d540-12bc-4ad9-bde8-4c3a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f9a65653-53de-44fd-a416-29aeb4cf5f1e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:28.000Z", "modified": "2018-03-13T13:42:28.000Z", "pattern": "[file:hashes.MD5 = '1a75be6c77ffedd2cde402495ddbe668' AND file:hashes.SHA1 = 'b8a3f39c3f8e61b4ea3de7973b749ff470da162c' AND file:hashes.SHA256 = 'b4898ad9f1757bd6f127fd9a539f393004654608037ba94b3a62a81166fd1163']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--19789499-f9e3-4415-afb9-7dee60e37880", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:26.000Z", "modified": "2018-03-13T13:42:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b4898ad9f1757bd6f127fd9a539f393004654608037ba94b3a62a81166fd1163/analysis/1515017524/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d542-5c08-4349-804c-4ecf02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d542-6730-414d-bcfb-480902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 22:12:04", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d542-9bbc-4622-9607-453202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--091a7f76-14d6-48df-86fc-76bf406a81a9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:30.000Z", "modified": "2018-03-13T13:42:30.000Z", "pattern": "[file:hashes.MD5 = '4fd9ccd0bd6e296a356d5e4ed06eec4f' AND file:hashes.SHA1 = '133af28ead4b2ef10f05f4cf8aaedb819a0b1bc1' AND file:hashes.SHA256 = 'fee25e7d024107c867f4ddbb61756bb02e935a8802813f5d8677b3ecc282759d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fc99724e-fb1c-49c1-a876-021d95449e91", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:28.000Z", "modified": "2018-03-13T13:42:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/fee25e7d024107c867f4ddbb61756bb02e935a8802813f5d8677b3ecc282759d/analysis/1520929147/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d544-a3f8-4662-a5cb-4d0202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "23/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d544-aa18-4d8c-a348-450302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 08:19:07", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d544-1374-4f30-9247-431d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--edc558da-e5d9-484e-a89c-2d4286e33de7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:32.000Z", "modified": "2018-03-13T13:42:32.000Z", "pattern": "[file:hashes.MD5 = '3961de98d1abbea525fbce184b538624' AND file:hashes.SHA1 = '38d8d3a9be1128e3f2e6656ba011713d4ae92526' AND file:hashes.SHA256 = 'f8af90b820a1e6b052ce62d9f8446457f74a4542c6d6f6eec354b895982502b1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a567af95-f7a3-4bf2-baa3-270f681e5322", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:30.000Z", "modified": "2018-03-13T13:42:30.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f8af90b820a1e6b052ce62d9f8446457f74a4542c6d6f6eec354b895982502b1/analysis/1520586165/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d546-1a80-4cc8-9b2c-405502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "27/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d547-abf8-4e43-8181-449002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-09 09:02:45", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d547-f040-42fc-a75c-41b602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ad876176-ecb0-4443-a1e3-3474fea95c7c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:34.000Z", "modified": "2018-03-13T13:42:34.000Z", "pattern": "[file:hashes.MD5 = 'd5dd018912ab9082c5589de04bac629f' AND file:hashes.SHA1 = '4a4afbe594e40e5bede5a23d633807310e150c31' AND file:hashes.SHA256 = 'e1b34078b5aab799cb78e7103286817a740da430fd1f107bfd4a673dce8fa9fc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4c0aa304-4439-4634-ab20-fa7a819e4cfb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:32.000Z", "modified": "2018-03-13T13:42:32.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e1b34078b5aab799cb78e7103286817a740da430fd1f107bfd4a673dce8fa9fc/analysis/1519360597/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d548-bdb4-4f97-a401-4f7602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d549-5690-4047-9c5c-476502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-23 04:36:37", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d549-d288-4aab-9137-472b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--27853edd-8b95-4a9c-8fd5-256adb3e5da6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:36.000Z", "modified": "2018-03-13T13:42:36.000Z", "pattern": "[file:hashes.MD5 = '00cf83ee91654990c031ce1b1de05435' AND file:hashes.SHA1 = '696ae9e32c7cc085d62336d910abe45111280f66' AND file:hashes.SHA256 = 'baf4586c1fcdc32fa2ac1441df17591aa34f54d842ad596abd2cadfc190f02e9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4a39f8b7-6642-4a32-aa2c-511de3de0ae6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:35.000Z", "modified": "2018-03-13T13:42:35.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/baf4586c1fcdc32fa2ac1441df17591aa34f54d842ad596abd2cadfc190f02e9/analysis/1520440814/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d54b-947c-4df4-a543-4a6202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d54b-791c-4e09-a367-450e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:40:14", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d54b-bbe0-40a4-9e81-48d202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--63998fb4-3796-4b69-bbb5-c786f85c6e24", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:39.000Z", "modified": "2018-03-13T13:42:39.000Z", "pattern": "[file:hashes.MD5 = '7212a4d269f3ba4e9e069d52c60a2285' AND file:hashes.SHA1 = '458735e06ded3057cb1df5a05074065c1fbdc64f' AND file:hashes.SHA256 = '41f8b418bd12776cd5bd154226d2646bb766bf3cfa95b41d03003386ada51789']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--77335a35-58f3-4736-8e65-9d43eadd3255", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:37.000Z", "modified": "2018-03-13T13:42:37.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/41f8b418bd12776cd5bd154226d2646bb766bf3cfa95b41d03003386ada51789/analysis/1520438275/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d54d-b458-4394-bbaa-45b102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d54d-619c-4d23-97dc-4a5202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:57:55", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d54d-3f70-42c6-8e48-473102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f501ee7d-5468-4059-a745-dc1f392e6a44", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:41.000Z", "modified": "2018-03-13T13:42:41.000Z", "pattern": "[file:hashes.MD5 = '0bec6bc954b25143f321d42b7dc8ab7a' AND file:hashes.SHA1 = 'f5ad792f0b7c0e4235c7671c381cbb97bfe81932' AND file:hashes.SHA256 = 'f010103d51638b98c985abdab4fe9deaeb850bf924f93b53c9084da8ce927f5b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8482a386-b5b8-479a-974a-219fe749b1ab", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:39.000Z", "modified": "2018-03-13T13:42:39.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f010103d51638b98c985abdab4fe9deaeb850bf924f93b53c9084da8ce927f5b/analysis/1517469178/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d54f-3738-4407-800c-4e2502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d550-be4c-425d-8d75-49f202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-01 07:12:58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d550-7b3c-45a9-814e-4ae102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ebfa55c6-2e68-4f35-a2f3-060799e22095", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:43.000Z", "modified": "2018-03-13T13:42:43.000Z", "pattern": "[file:hashes.MD5 = 'f18c88198ce4f026bbd160c998151ea0' AND file:hashes.SHA1 = 'fd61fa76d4f22f617a51efc966704e96cc660e93' AND file:hashes.SHA256 = '5cab554b4aa4864cce93e6853142cd361866fe37bb55e13711163ebee9286662']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a3bb6a50-5123-498e-8f1a-6923b54b0b35", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:42.000Z", "modified": "2018-03-13T13:42:42.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5cab554b4aa4864cce93e6853142cd361866fe37bb55e13711163ebee9286662/analysis/1520438781/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d552-3470-4a5e-91c3-4acd02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d552-ce08-450f-a329-4eea02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:06:21", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d552-5c3c-4de7-af63-42ec02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2316025b-81d4-4611-8420-62597b2163f7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:46.000Z", "modified": "2018-03-13T13:42:46.000Z", "pattern": "[file:hashes.MD5 = 'ddf6d305bbab8b6394c98f4b340a59f7' AND file:hashes.SHA1 = '6eb9e9d79018b32edcd2cbfef9db7d31e59d543b' AND file:hashes.SHA256 = 'c26dbbb1c5ee2c35561eebdd89f03be9e200da66ba31f63c1c074300c9277764']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--436f3cd9-f66e-4d35-b0c3-ba8c39c5a0c4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:44.000Z", "modified": "2018-03-13T13:42:44.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/c26dbbb1c5ee2c35561eebdd89f03be9e200da66ba31f63c1c074300c9277764/analysis/1518959606/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d554-db40-4d65-8b7f-470d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "39/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d554-df04-454a-8979-4ab902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-18 13:13:26", "category": "Other", "comment": "Executable File", "uuid": "5aa7d554-a640-46ce-9469-43d502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dc57f819-a4ca-4824-ba9d-e6d0e9f78b9d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:48.000Z", "modified": "2018-03-13T13:42:48.000Z", "pattern": "[file:hashes.MD5 = '35e9067e608aa8fc816869c022c520be' AND file:hashes.SHA1 = '1945aa2c167f3348af207b024a16f0bb7937ec62' AND file:hashes.SHA256 = 'abacd28fa6ac67ecb85aa15ac26d48fc60c5d0f8a0301f0d1ea4421c69685c3b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--37f56d93-b168-44cb-90c9-e245c6eee85a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:46.000Z", "modified": "2018-03-13T13:42:46.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/abacd28fa6ac67ecb85aa15ac26d48fc60c5d0f8a0301f0d1ea4421c69685c3b/analysis/1520376537/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d556-6014-40c9-a659-4b3802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d556-9b04-4e0b-a43c-45a402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:57", "category": "Other", "comment": "Executable File", "uuid": "5aa7d556-3040-42ec-b3bc-477a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4f1fd255-9d15-43ec-a8b6-5fdf0abbd1c5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:50.000Z", "modified": "2018-03-13T13:42:50.000Z", "pattern": "[file:hashes.MD5 = '5b388ad24d07f6e7833806fe98f8c737' AND file:hashes.SHA1 = 'e47f79c321bc072df3fb2e1fc3d78c57098abacd' AND file:hashes.SHA256 = '8599d1ce8abd86248f214f44a87cccf8e428c59451db3f8f09606c3d15d99d74']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--18efd0c2-3813-4e9f-bf69-330dea779353", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:48.000Z", "modified": "2018-03-13T13:42:48.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8599d1ce8abd86248f214f44a87cccf8e428c59451db3f8f09606c3d15d99d74/analysis/1520439638/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d558-0e10-469d-ba38-47d302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d558-eee0-438f-82cc-447702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:20:38", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d558-bcd0-4fc6-87ba-447802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8f789d00-5c20-45f6-8091-834ea7f79fcd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:52.000Z", "modified": "2018-03-13T13:42:52.000Z", "pattern": "[file:hashes.MD5 = '8e4619753a07b460587ddb8dcc1726da' AND file:hashes.SHA1 = 'e65b2c3c7944bed2ffe96cd6a15e6ff2f5de2b50' AND file:hashes.SHA256 = '02adb1fdee7b1306e2ba7a07a052b6d390d8e939c807b7b6515589312d072e79']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--74d6bbc6-5b6e-485e-b40f-e0076046c307", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:50.000Z", "modified": "2018-03-13T13:42:50.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/02adb1fdee7b1306e2ba7a07a052b6d390d8e939c807b7b6515589312d072e79/analysis/1520839028/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d55a-d9a4-4730-8656-428802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d55b-8af8-42b6-bf3b-40af02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 07:17:08", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d55b-30c4-4be4-bbcd-489502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--318e9442-266a-42df-9bcb-57af40dc6fee", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:54.000Z", "modified": "2018-03-13T13:42:54.000Z", "pattern": "[file:hashes.MD5 = 'a190d9f1f987ec7e7845d8bbb766b45d' AND file:hashes.SHA1 = 'b1e303d44b81ebdb4efd6e25438a9ae753d0a0b7' AND file:hashes.SHA256 = 'f0b78cf8d5df4c9873ecd7750eb6b49d565097ca59e8592b07a2e748fda1ab2d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9f4cb389-a3be-4918-8887-595689e68ba0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:53.000Z", "modified": "2018-03-13T13:42:53.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f0b78cf8d5df4c9873ecd7750eb6b49d565097ca59e8592b07a2e748fda1ab2d/analysis/1520441183/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d55d-099c-4784-8bf4-440c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d55d-e4a4-42fd-96f3-4fc402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:46:23", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d55d-78a8-4c8b-98c1-4c0202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6212c88a-a171-457e-bce5-e495cb75bcd6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:57.000Z", "modified": "2018-03-13T13:42:57.000Z", "pattern": "[file:hashes.MD5 = '109342c136665d62be40eab87fe88340' AND file:hashes.SHA1 = '3d811b2435c20fe6e6754c536a705c27a968e668' AND file:hashes.SHA256 = 'f9ca935d9f3a6aac48de55486eb8ca62f003baf50ced255305048464d9fd0016']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8d1e8e66-f43c-4d3f-8b88-326769b2dadd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:55.000Z", "modified": "2018-03-13T13:42:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f9ca935d9f3a6aac48de55486eb8ca62f003baf50ced255305048464d9fd0016/analysis/1520441503/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d55f-333c-4ffd-86a4-422c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d55f-1b78-44d3-8d9f-48d602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:51:43", "category": "Other", "comment": "Executable File", "uuid": "5aa7d560-11b4-4787-9a14-472502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b564d217-c2db-44d8-b069-916f0fee7fc7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:59.000Z", "modified": "2018-03-13T13:42:59.000Z", "pattern": "[file:hashes.MD5 = 'dd1d1b2bd2bb8be3340c5e21a96abac1' AND file:hashes.SHA1 = '782a58281fd3b13b3cd0f824755cac5c2f72cb86' AND file:hashes.SHA256 = '1fe5990f49535a312c2067188aad878933a778a7d4d7d4724d08a5637a72b9d0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:42:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2693cbb3-ac2c-476e-a4bf-b199c7e88878", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:57.000Z", "modified": "2018-03-13T13:42:57.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/1fe5990f49535a312c2067188aad878933a778a7d4d7d4724d08a5637a72b9d0/analysis/1520376506/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d561-694c-412e-a3dd-493d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "43/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d562-4674-437c-984e-4ed102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:26", "category": "Other", "comment": "Executable File", "uuid": "5aa7d562-b7cc-4562-a72c-460002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3bc0a925-001a-4ec0-b662-c6ffdfa883da", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:01.000Z", "modified": "2018-03-13T13:43:01.000Z", "pattern": "[file:hashes.MD5 = '61d4f2dde2e129c66caace0d04b665f8' AND file:hashes.SHA1 = 'b0281ff17dc7bb0f08e318d5bf2b01e7aa1e41d1' AND file:hashes.SHA256 = '49580ca29529de4ac3ce037c6bf5b9c675a9f770c7ec4d1203ce19391e0661ea']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9c4a8abf-36e5-45f2-9950-acb6fc6d6d8d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:42:59.000Z", "modified": "2018-03-13T13:42:59.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/49580ca29529de4ac3ce037c6bf5b9c675a9f770c7ec4d1203ce19391e0661ea/analysis/1512484746/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d563-02d0-4580-9040-4d0b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "24/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d564-2de8-4868-a78f-476f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-05 14:39:06", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d564-c644-48b6-b384-4ba202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--de573c2e-d1b7-4454-830b-ee0de6ffebe7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:03.000Z", "modified": "2018-03-13T13:43:03.000Z", "pattern": "[file:hashes.MD5 = '9cb474c37d71ed352f69b0ae54ed8dfd' AND file:hashes.SHA1 = 'bbb8365cdfcfa1e8a4d414eb66c983c72f4451c2' AND file:hashes.SHA256 = '1ecf353cee0116eed985085707c29ba7a006da2975863f31372b3bd6a0ab7974']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2b361753-16d6-4b91-aa83-2241be1c2111", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:01.000Z", "modified": "2018-03-13T13:43:01.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/1ecf353cee0116eed985085707c29ba7a006da2975863f31372b3bd6a0ab7974/analysis/1517937571/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d566-a8ec-4702-a4af-46c202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d566-78bc-49c1-91df-48bc02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-06 17:19:31", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d566-93d0-4739-9fc1-492202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f845f0d3-8a14-4cd0-ac52-b68a45ad6bd1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:05.000Z", "modified": "2018-03-13T13:43:05.000Z", "pattern": "[file:hashes.MD5 = '202858c4ab316d84e226abb28c26658f' AND file:hashes.SHA1 = '6bdb20ec6615cdf4e5e70dc66b8a1a9b9b5e0813' AND file:hashes.SHA256 = '7dac5f0299bdc8a36df6ca4eac7a649754a8c706b7211108b26cb0eeb1d72a67']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--22ac03b3-05b2-4cb3-b1cf-06a04d09b191", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:04.000Z", "modified": "2018-03-13T13:43:04.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7dac5f0299bdc8a36df6ca4eac7a649754a8c706b7211108b26cb0eeb1d72a67/analysis/1520439453/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d568-4f38-474a-b723-4d4702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d568-e300-4a02-9e1a-4ed502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:17:33", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d568-8728-4588-b096-41b902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b7dc6423-6d05-411f-ab96-1f5fe5bff960", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:08.000Z", "modified": "2018-03-13T13:43:08.000Z", "pattern": "[file:hashes.MD5 = 'dc981a9f17968c5acb2f65be82a60bb4' AND file:hashes.SHA1 = '7b346a44ab9de76a4dd762ab124c0d43a4fcdbe7' AND file:hashes.SHA256 = '39fb5a2659b013894366ae3620a74ff5eb381e39c15ea76d148a93a9b43a5aeb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--99910c76-477b-4cf0-bae3-dd9aabed6f4c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:06.000Z", "modified": "2018-03-13T13:43:06.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/39fb5a2659b013894366ae3620a74ff5eb381e39c15ea76d148a93a9b43a5aeb/analysis/1517932097/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d56a-89c8-4fe6-8b4c-44e702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d56b-0f08-41f2-afb2-44e002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-06 15:48:17", "category": "Other", "comment": "Executable File", "uuid": "5aa7d56b-74e4-4484-9a9c-411702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--db1db06e-a0ec-4bb8-b529-d8eb867e24c4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:10.000Z", "modified": "2018-03-13T13:43:10.000Z", "pattern": "[file:hashes.MD5 = '0eb8580ea0c1634a11e2fcd7fcfcae04' AND file:hashes.SHA1 = '03f59b018acbda4c6e63db913a78c70499323bc0' AND file:hashes.SHA256 = 'b84cac469c097e1296c00029f8ffb1b7e12fb791d10da6e01485079a7750958c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5fc6ede9-b781-4eb4-8c6a-a47a025901ef", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:08.000Z", "modified": "2018-03-13T13:43:08.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b84cac469c097e1296c00029f8ffb1b7e12fb791d10da6e01485079a7750958c/analysis/1520446096/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d56c-a008-4322-adc1-476b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "22/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d56d-dc14-4e8d-aba9-458e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 18:08:16", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d56d-5c14-4b0f-90bd-4eda02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--42066cdc-d515-4c5e-b536-6403bd2fa1b5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:12.000Z", "modified": "2018-03-13T13:43:12.000Z", "pattern": "[file:hashes.MD5 = 'd6229a6a24180bbf601015d9a14d4b1a' AND file:hashes.SHA1 = 'c5184154b100074ef4c743409ecee20f4b41b78e' AND file:hashes.SHA256 = 'f974b1b74f862028f1335b15ed98d1388cdc770b6770aac9b7cc62847d9dad32']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--869f01f6-7bb3-44b4-bc9e-8b736da289fa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:11.000Z", "modified": "2018-03-13T13:43:11.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f974b1b74f862028f1335b15ed98d1388cdc770b6770aac9b7cc62847d9dad32/analysis/1520441475/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d56f-20dc-4a3f-8962-4ba602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d56f-8198-4f5f-a3c4-449102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:51:15", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d56f-b4ec-431e-b0e8-477202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b2a4407f-5430-4c80-bf8f-507f234cdf38", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:15.000Z", "modified": "2018-03-13T13:43:15.000Z", "pattern": "[file:hashes.MD5 = '231d4f2c7eb9b8af7915e3ca4d4c1d2b' AND file:hashes.SHA1 = '55e714a36a7922274733ffaf8ddbb9ff77787c22' AND file:hashes.SHA256 = 'c273a69f39e66cf687f1d9089e7c21191f265c34c0dded99cefea57df8509c24']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--081ea566-bd34-49d7-be26-ccbb3ad585d1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:13.000Z", "modified": "2018-03-13T13:43:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/c273a69f39e66cf687f1d9089e7c21191f265c34c0dded99cefea57df8509c24/analysis/1520908441/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d571-e298-4d94-ab21-4c0802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d571-6a9c-43ae-a888-4ded02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 02:34:01", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d571-36ec-423a-a9ac-422b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4baac2f7-b640-49ea-aa37-60ae3a4b7e66", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:17.000Z", "modified": "2018-03-13T13:43:17.000Z", "pattern": "[file:hashes.MD5 = 'a0244651058e342d7ecaf380dc9c3b2d' AND file:hashes.SHA1 = '1c78794d44a4c668c2e48904ab35cf13a465eb78' AND file:hashes.SHA256 = 'fe206a8849d7f95e4233effa97883a03e2d8d3672c0b9af18dcf9d5d59b9f22b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--93f77b86-ed4f-4313-8c22-6010b7795a8d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:15.000Z", "modified": "2018-03-13T13:43:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/fe206a8849d7f95e4233effa97883a03e2d8d3672c0b9af18dcf9d5d59b9f22b/analysis/1520488614/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d573-4bfc-4256-87e3-420002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d574-ba88-4b52-8219-484c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:56:54", "category": "Other", "comment": "Executable File", "uuid": "5aa7d574-e8e0-4d19-84da-456202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7baf9480-e568-41e6-a1f1-fff7d516fbb1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:19.000Z", "modified": "2018-03-13T13:43:19.000Z", "pattern": "[file:hashes.MD5 = '42f64228b2af7b7e7894e37c6ae0f304' AND file:hashes.SHA1 = '92b154bb810093dcde3225c6b524f30d1731a5ad' AND file:hashes.SHA256 = '932be9385b60b1b2f7d2e2861a9b568a291846ecf0227413417c99d2d16785c0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b8d85b22-76dc-4882-85ac-0fb0f74b754f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:18.000Z", "modified": "2018-03-13T13:43:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/932be9385b60b1b2f7d2e2861a9b568a291846ecf0227413417c99d2d16785c0/analysis/1511812798/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d576-86ac-4c8d-8f27-46f202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "42/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d576-48ac-453c-9928-465202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-27 19:59:58", "category": "Other", "comment": "Executable File", "uuid": "5aa7d576-62a0-4f2a-9364-470902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--70733fd0-6c28-4129-980c-8ff97d139d43", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:22.000Z", "modified": "2018-03-13T13:43:22.000Z", "pattern": "[file:hashes.MD5 = 'bbf3be06a6f4b6b34af48f55072da837' AND file:hashes.SHA1 = '4ee432a723f26b76fd7f91991b297e57b0913562' AND file:hashes.SHA256 = 'f23d4daa59e771990a4ed13100d5a39454c89e3c01ccfb6bfa9b3257dcd51b13']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--808e6a5f-a93e-48f1-8678-d5f32b61f516", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:20.000Z", "modified": "2018-03-13T13:43:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f23d4daa59e771990a4ed13100d5a39454c89e3c01ccfb6bfa9b3257dcd51b13/analysis/1520441264/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d578-ac44-4fa7-b45a-489a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d578-2f94-4f41-874a-42da02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:47:44", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d579-7c58-49f2-983e-415202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--86a9886d-1f0c-48e5-978c-8f96df99efed", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:24.000Z", "modified": "2018-03-13T13:43:24.000Z", "pattern": "[file:hashes.MD5 = 'b5cefb3abd3aaced7715e7bb325dc275' AND file:hashes.SHA1 = 'eb3f2713305b54519e3e2e81cc2200e57f38a4e3' AND file:hashes.SHA256 = '19212bfe27243227b15d7fb9e454d2c624e5d6cf847b8750a4a9b5ad55aec14d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--980fe535-bfc5-45db-979a-1c6e45bfa4b4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:22.000Z", "modified": "2018-03-13T13:43:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/19212bfe27243227b15d7fb9e454d2c624e5d6cf847b8750a4a9b5ad55aec14d/analysis/1516315723/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d57a-2c74-461d-91df-444a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d57b-47e0-4b56-be67-491102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-18 22:48:43", "category": "Other", "comment": "Executable File", "uuid": "5aa7d57b-e7dc-4198-a5fb-4f7802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--991239b6-a59d-4891-9365-3297334f53b8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:26.000Z", "modified": "2018-03-13T13:43:26.000Z", "pattern": "[file:hashes.MD5 = 'c80c5e98a77e1ec30fd1ed74f25726b4' AND file:hashes.SHA1 = 'b4f0a39ce7779e96049d91d02bcae95feb189247' AND file:hashes.SHA256 = 'aa96c4de7bc4edeb68bd03a6a5455139e389e4e40e154732ddce3255e2f7efe6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e5931a6d-c9d6-4c85-9184-45c54d0896e5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:24.000Z", "modified": "2018-03-13T13:43:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/aa96c4de7bc4edeb68bd03a6a5455139e389e4e40e154732ddce3255e2f7efe6/analysis/1520913598/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d57d-31ac-465f-9ef6-42a502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d57d-8d6c-4511-9b94-469002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:59:58", "category": "Other", "comment": "Executable File", "uuid": "5aa7d57d-6940-4389-b6c3-4f3a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--af070041-9ff6-4592-b8f9-c8321cb360ab", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:29.000Z", "modified": "2018-03-13T13:43:29.000Z", "pattern": "[file:hashes.MD5 = '3b687c516e1269c54c04e709ce0826a0' AND file:hashes.SHA1 = 'aeffe4e76999e2f738ea72f2d1979f5e0c9e3bca' AND file:hashes.SHA256 = 'd942f42f13aebdeff0f6d2ad02ba0d86d7ef7bfb070fec0e32e0aa8851032e9d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3b6371b2-89d5-4271-ada4-05f54fd4ceb7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:27.000Z", "modified": "2018-03-13T13:43:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d942f42f13aebdeff0f6d2ad02ba0d86d7ef7bfb070fec0e32e0aa8851032e9d/analysis/1515019768/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d57f-4a40-43a9-a27c-4bfe02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d580-ebcc-42f7-872a-4bce02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 22:49:28", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d580-b81c-4cb6-aafc-40e202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e518371a-6ff1-4160-86db-52fd485c75ed", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:31.000Z", "modified": "2018-03-13T13:43:31.000Z", "pattern": "[file:hashes.MD5 = '388a0cccf56767b28f0ebebf746d938b' AND file:hashes.SHA1 = 'ee90cdd76a34113982c3d4fde6c675eeeb6d2b2f' AND file:hashes.SHA256 = '7210f0314f4814b28c2157e10d4ffdb10bd575dab6b93c90027820e16e2b109d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--16b70a36-22ec-44de-9284-c8513068cae6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:30.000Z", "modified": "2018-03-13T13:43:30.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7210f0314f4814b28c2157e10d4ffdb10bd575dab6b93c90027820e16e2b109d/analysis/1518015249/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d582-678c-455c-b46b-49b102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d582-b040-4422-9d97-4f2402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-07 14:54:09", "category": "Other", "comment": "Executable File", "uuid": "5aa7d582-2d18-4e7a-934f-43b702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--774d6ed8-303c-4a84-935d-f3ac619f4e8f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:34.000Z", "modified": "2018-03-13T13:43:34.000Z", "pattern": "[file:hashes.MD5 = '82d5bc54464e1d903cb806b9cc66faa7' AND file:hashes.SHA1 = 'f7a48cdfc7dccc4db70fc2d96058020ade558264' AND file:hashes.SHA256 = 'e9c24d0a80b622749a1b30f9d384a7cdd844310dbd3054898ec322cfabb65280']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--dc1da038-6340-42d1-ba26-176fe9bcded0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:32.000Z", "modified": "2018-03-13T13:43:32.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e9c24d0a80b622749a1b30f9d384a7cdd844310dbd3054898ec322cfabb65280/analysis/1520376486/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d584-4dc8-4e15-a1f1-4ed702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "25/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d584-e5f4-4aed-bfa8-4eb002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:06", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d584-e470-4205-8123-44f502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f6f9fee4-876e-4765-ac1f-923a8e449811", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:36.000Z", "modified": "2018-03-13T13:43:36.000Z", "pattern": "[file:hashes.MD5 = 'ee6907f199304c605ee5ddd6218952c3' AND file:hashes.SHA1 = 'e9f6fee09c9cc8fb0c2786a8849e9b0fb7cb7bc5' AND file:hashes.SHA256 = '3e6b779c02e528436709c1873f5282453326c2f6ef1b9c4e1f6ff8f868728d80']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6c106bd5-9842-4461-b8dd-0faa223d2c68", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:34.000Z", "modified": "2018-03-13T13:43:34.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3e6b779c02e528436709c1873f5282453326c2f6ef1b9c4e1f6ff8f868728d80/analysis/1426915074/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d586-6368-44f2-bad3-484002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/57", "category": "Other", "comment": "Executable File", "uuid": "5aa7d587-63d4-423e-b0f3-401b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2015-03-21 05:17:54", "category": "Other", "comment": "Executable File", "uuid": "5aa7d587-fb90-4418-9bd5-431e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ef7ab321-e2e2-45d6-a76b-ed61d6ccbdba", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:38.000Z", "modified": "2018-03-13T13:43:38.000Z", "pattern": "[file:hashes.MD5 = 'd91e921a957f1f6e8b1a546982e5ab28' AND file:hashes.SHA1 = 'e92a5e6c6f11da81f76d2b59958c1c73d192c846' AND file:hashes.SHA256 = '3b48246dc4b173a48a8fc04fcd4809fae45b8c73b0d33caa7052ef4b327fcbec']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fccef241-584e-4a8c-bcac-44550ac946a0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:36.000Z", "modified": "2018-03-13T13:43:36.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3b48246dc4b173a48a8fc04fcd4809fae45b8c73b0d33caa7052ef4b327fcbec/analysis/1520488428/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d589-dd44-4141-ba42-4a1502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/65", "category": "Other", "comment": "Executable File", "uuid": "5aa7d589-0388-444d-9a1c-426802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:53:48", "category": "Other", "comment": "Executable File", "uuid": "5aa7d589-2a8c-4fcd-a3cc-414502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--972390dc-b051-4c4f-952a-2daca6c94e2a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:41.000Z", "modified": "2018-03-13T13:43:41.000Z", "pattern": "[file:hashes.MD5 = 'c24649b599e56bb433da287298da98d0' AND file:hashes.SHA1 = '6bf878e76540e8eeb2c06a3f15fbf07baa1eaaef' AND file:hashes.SHA256 = '62e3f58ec80fac52b6d1c12b17254c254b5113a70e8510df7b9bd49314aec00f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6d2857f8-cde7-49a7-86f7-27711cde2de0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:39.000Z", "modified": "2018-03-13T13:43:39.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/62e3f58ec80fac52b6d1c12b17254c254b5113a70e8510df7b9bd49314aec00f/analysis/1520194921/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d58b-6bc8-4c68-8588-4d1502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "40/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d58c-8bd4-45bc-a34a-449d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-04 20:22:01", "category": "Other", "comment": "Executable File", "uuid": "5aa7d58c-37f4-4aea-8c2d-4e3902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6c18de88-4e54-4aca-8333-7b6002fc6581", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:43.000Z", "modified": "2018-03-13T13:43:43.000Z", "pattern": "[file:hashes.MD5 = '0fccc1bf870df0df3b48e0b0ed50e5d5' AND file:hashes.SHA1 = 'b3a442888010182a411a7b19ebc21d55da83aecc' AND file:hashes.SHA256 = 'b0e2cef91b30ab96b6893659537a44986767272dfc2438af8281455af0f892e0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3fe466f9-e2a4-4cd9-85fe-b5985c458e79", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:42.000Z", "modified": "2018-03-13T13:43:42.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b0e2cef91b30ab96b6893659537a44986767272dfc2438af8281455af0f892e0/analysis/1520909820/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d58e-ad0c-4cb7-a9dc-4d0e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d58e-f74c-4b07-9bb4-4f6002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 02:57:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d58e-e0a0-45d2-a7a1-492802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c0777536-9c34-4420-ad25-8a811bf2948c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:46.000Z", "modified": "2018-03-13T13:43:46.000Z", "pattern": "[file:hashes.MD5 = '918c7b5973b7205ca1e065561e403a29' AND file:hashes.SHA1 = 'a098c3094d73821f609be84ee5043fd3c5605d95' AND file:hashes.SHA256 = 'bf490a1a63c7e23b4afbe9140955b587457fef2c281c38defd8cde2c76c6f65b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--eeac1674-b2c3-403a-af56-098d62b62f9d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:44.000Z", "modified": "2018-03-13T13:43:44.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/bf490a1a63c7e23b4afbe9140955b587457fef2c281c38defd8cde2c76c6f65b/analysis/1520440919/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d590-e71c-4689-ba83-4c0102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d590-8864-4af0-83d8-444a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:41:59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d590-d454-4164-90e8-47b102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ad0bbb06-2204-4a91-a97c-85d1f2c8bedc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:48.000Z", "modified": "2018-03-13T13:43:48.000Z", "pattern": "[file:hashes.MD5 = '40b5f45c83732b8678240fdf45e4a0d2' AND file:hashes.SHA1 = 'd6c16f055b0ea9ac5a5dec4cd42aa7b0e33412ec' AND file:hashes.SHA256 = '258e9ac0aff2d08496427b988d5f98234d3098329f116202ac1a1c9e5afd272a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c511bbf9-ee03-472f-9275-86e54f87e603", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:46.000Z", "modified": "2018-03-13T13:43:46.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/258e9ac0aff2d08496427b988d5f98234d3098329f116202ac1a1c9e5afd272a/analysis/1520437768/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d592-c2ec-463f-84a9-466102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d593-42ac-4621-ae4c-49da02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:49:28", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d593-7614-47a7-afe8-47a502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--181cb412-06ff-42e2-9e5c-f3b5a7f11780", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:50.000Z", "modified": "2018-03-13T13:43:50.000Z", "pattern": "[file:hashes.MD5 = '8ee304efa087574c9df940ab2ca5474e' AND file:hashes.SHA1 = '024652ecbfa0bad984f890fd3cf94e37cf783e01' AND file:hashes.SHA256 = 'f11b7237907275ca59ce4f0b630f69a6c3770b0060359917bf465690e2309e47']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d09085d8-c050-4efa-8e91-586e9207ef3c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:49.000Z", "modified": "2018-03-13T13:43:49.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f11b7237907275ca59ce4f0b630f69a6c3770b0060359917bf465690e2309e47/analysis/1520441209/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d595-06c0-48ea-8958-440e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d595-3a90-4926-a08d-4d9d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:46:49", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d595-e288-4552-9005-426c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7fadae6d-0f96-456c-8717-ce5168fcd964", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:53.000Z", "modified": "2018-03-13T13:43:53.000Z", "pattern": "[file:hashes.MD5 = 'faa964161704ee5e807983065dcfe4a9' AND file:hashes.SHA1 = '68b0972217652e01df2d894de261bced0e58f2ce' AND file:hashes.SHA256 = '0acc741c806c8c0bed64d14d6a9d69580ece212e6517ffced865c2be31bf72fd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5978498f-332b-46d5-ac8b-5da2f33ba5fc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:51.000Z", "modified": "2018-03-13T13:43:51.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0acc741c806c8c0bed64d14d6a9d69580ece212e6517ffced865c2be31bf72fd/analysis/1520909460/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d597-3790-4b5b-a0d2-445a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d598-0d0c-4e3f-a73e-4b6d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 02:51:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d598-6b00-41f8-834a-438402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--84d40159-8f0c-400c-8d61-34ea3ee11fd5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:55.000Z", "modified": "2018-03-13T13:43:55.000Z", "pattern": "[file:hashes.MD5 = '0b42241d62892e79ba105f81e2132c7c' AND file:hashes.SHA1 = 'cd1d007ec54c80fd222d6e7fb847546af539deb7' AND file:hashes.SHA256 = 'a51dbcb87d67fc1edb0be26d35a632140383b47d2ba16c053825b551cf152f3d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fa3049b4-4fb2-4010-b3d6-df251f5e601d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:53.000Z", "modified": "2018-03-13T13:43:53.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a51dbcb87d67fc1edb0be26d35a632140383b47d2ba16c053825b551cf152f3d/analysis/1520912414/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d599-ffcc-4ac5-a1a2-4aff02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "38/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d59a-4044-4673-afc0-4a0902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:40:14", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d59a-1dc8-4fe3-8be6-4d4702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--97613f9a-68d6-4e2b-92a4-99963309ce91", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:57.000Z", "modified": "2018-03-13T13:43:57.000Z", "pattern": "[file:hashes.MD5 = '3e2c9fe205543b825746ebed07976b65' AND file:hashes.SHA1 = 'f63603f75fc2c562df52a8dfefcff39538cefbcb' AND file:hashes.SHA256 = 'b3dbbe79bdbf9e6d6a8eb1bcc9350f847b76aaf304bc981dca9fdf281ba22360']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:43:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--be1dbba5-f49d-4dc9-b130-19e084d25584", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:56.000Z", "modified": "2018-03-13T13:43:56.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b3dbbe79bdbf9e6d6a8eb1bcc9350f847b76aaf304bc981dca9fdf281ba22360/analysis/1520440577/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d59c-6568-4a4d-84c2-4be602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d59c-c33c-4146-939d-439902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:36:17", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d59c-3e4c-4e45-a948-434302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9850420f-b885-45a9-a6e2-af2380c164a7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:00.000Z", "modified": "2018-03-13T13:44:00.000Z", "pattern": "[file:hashes.MD5 = 'da871572b4645baab4032cf470d1e9d5' AND file:hashes.SHA1 = '7b704ff1d98e0afd2237fc32515aa8f6e8504761' AND file:hashes.SHA256 = 'e89d9478aa4451584a1e6263dafaa39059e0aac3b1c02f00c64705bbb5449a43']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--09920e57-e715-4c54-b158-9a9ee4b11723", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:43:58.000Z", "modified": "2018-03-13T13:43:58.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e89d9478aa4451584a1e6263dafaa39059e0aac3b1c02f00c64705bbb5449a43/analysis/1501377522/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d59e-3e30-4630-befa-42ce02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/65", "category": "Other", "comment": "Executable File", "uuid": "5aa7d59e-ac70-463f-95e2-44cf02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-07-30 01:18:42", "category": "Other", "comment": "Executable File", "uuid": "5aa7d59e-46cc-453b-92a5-4cb402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e4a8088c-bb92-4cff-9775-8f2369d9c9d7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:02.000Z", "modified": "2018-03-13T13:44:02.000Z", "pattern": "[file:hashes.MD5 = '1d4072881433bca562cc74753310fce3' AND file:hashes.SHA1 = '9d3b0622279c5a862946c2e68f2da0127bf046dc' AND file:hashes.SHA256 = '5abc641c6f48c2ef5e8886085e375cdda5ab5ea47b2f935c1060232e8795d030']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5850fabb-73d0-4f76-a406-a6f7e27b0b09", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:00.000Z", "modified": "2018-03-13T13:44:00.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5abc641c6f48c2ef5e8886085e375cdda5ab5ea47b2f935c1060232e8795d030/analysis/1520903460/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5a0-25c8-4968-b89c-42db02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5a1-2c78-410f-ae43-49db02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 01:11:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5a1-2018-4fe4-b135-476402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e60f450e-6f03-470e-9126-dc098b8138a0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:04.000Z", "modified": "2018-03-13T13:44:04.000Z", "pattern": "[file:hashes.MD5 = '21ab6e815063f66de014230f2d13bda1' AND file:hashes.SHA1 = '26ab72a7420d6538c6aa6186c23a27eb874e78eb' AND file:hashes.SHA256 = 'dcf687e47e3ff38a34ab94cf0651e6a45a7d63ee4c7668bfbe3ebc375da3d7ba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--eef7f7bc-bb25-4b04-9930-1d76137be36e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:02.000Z", "modified": "2018-03-13T13:44:02.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/dcf687e47e3ff38a34ab94cf0651e6a45a7d63ee4c7668bfbe3ebc375da3d7ba/analysis/1517469637/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5a2-4b44-4f0c-a0c4-404002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5a3-72a0-471e-89b4-40f902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-01 07:20:37", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5a3-a078-4ca4-99b8-4d8f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--110e5750-cf74-4fe0-9af7-59757472d6e4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:06.000Z", "modified": "2018-03-13T13:44:06.000Z", "pattern": "[file:hashes.MD5 = '769bfb1fd8f5eb181846c6d55845fec6' AND file:hashes.SHA1 = '39212552a49b7097a7f6409f80141adb14ef04be' AND file:hashes.SHA256 = '8d74ae7b6a50c748ded262a822aa429a65666b965862ff2f4edafcd3a6f622d8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c2a69426-1e1e-4522-b6dc-a3833d75a33e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:05.000Z", "modified": "2018-03-13T13:44:05.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8d74ae7b6a50c748ded262a822aa429a65666b965862ff2f4edafcd3a6f622d8/analysis/1520439824/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5a5-fb5c-48f6-846d-4d4602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5a5-4f04-4b0f-a582-4f1d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:23:44", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5a5-5eec-4920-95d4-43c502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--60afce5d-2b5c-4c36-ab17-ab9544a2744e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:09.000Z", "modified": "2018-03-13T13:44:09.000Z", "pattern": "[file:hashes.MD5 = '2b9bead7066d932743ca82e2e90e482a' AND file:hashes.SHA1 = '97b132de05a2ccca487bdc19ce10db493c18bba2' AND file:hashes.SHA256 = 'bb4eeb211e54b55d35f7b46ab85420e2ed033c0594f906aef7495430d30bb7f7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b80f6804-4169-4522-825b-985b9349fabc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:07.000Z", "modified": "2018-03-13T13:44:07.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/bb4eeb211e54b55d35f7b46ab85420e2ed033c0594f906aef7495430d30bb7f7/analysis/1514997361/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5a7-4fe0-4f7c-8d56-4ee002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5a8-9ef0-42fb-aacc-469602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 16:36:01", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5a8-c910-4b91-bc28-443502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--20408dac-7c98-4bcf-bd33-a53de3436da3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:11.000Z", "modified": "2018-03-13T13:44:11.000Z", "pattern": "[file:hashes.MD5 = '1713e740fb8f42d3124ca0103dbb527b' AND file:hashes.SHA1 = '55a5d61bdc3dc1a529099b00b926ead174f5e7f0' AND file:hashes.SHA256 = '38a80f5c92fa7444b757f8cba214ab7db7b4a57a38a432f56a0aaba7e80c692c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9a547937-9c10-4da0-8147-fa1e898ed8bc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:10.000Z", "modified": "2018-03-13T13:44:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/38a80f5c92fa7444b757f8cba214ab7db7b4a57a38a432f56a0aaba7e80c692c/analysis/1520906952/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5aa-c81c-495a-9bac-4d9402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5aa-1848-4c18-92ab-443d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 02:09:12", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5aa-6328-46a2-9974-4e7102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b9ebd188-91d8-4229-8b64-13d8daa59f3e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:14.000Z", "modified": "2018-03-13T13:44:14.000Z", "pattern": "[file:hashes.MD5 = '1f2774a86fc782d73799a3c7c70d094a' AND file:hashes.SHA1 = '02ac7f9bbaa926ae27a1459098943e4b02557b91' AND file:hashes.SHA256 = '9b636ae57cc03448c09ba6501fd71a2885a947db2295365cfe1fb3df3900f72b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d6008b30-2b4b-4d67-b609-7d7a5604ab1d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:12.000Z", "modified": "2018-03-13T13:44:12.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9b636ae57cc03448c09ba6501fd71a2885a947db2295365cfe1fb3df3900f72b/analysis/1520376534/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5ac-5c2c-48e4-96b8-41d002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5ad-b0ec-4a9e-8ac4-42aa02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:54", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5ad-bf04-41b2-b6d7-428002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--682d3605-86dd-4f7e-80f2-a99ad1dd4e70", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:16.000Z", "modified": "2018-03-13T13:44:16.000Z", "pattern": "[file:hashes.MD5 = 'b8fd3d256e15909d5008f298aaf46b8f' AND file:hashes.SHA1 = '02e90b14cc5437357f5539cfee7be4dedc3c1871' AND file:hashes.SHA256 = '01b3d5de0e7c80516811276c31c2ba5d10020f04a7f7be5517c0fb2f452b8fcc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d94c34c7-d78d-4d62-82e9-911bc6d298bd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:14.000Z", "modified": "2018-03-13T13:44:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/01b3d5de0e7c80516811276c31c2ba5d10020f04a7f7be5517c0fb2f452b8fcc/analysis/1503683054/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5ae-6f70-4b25-9ecd-491802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/65", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5af-f824-496d-b20a-412e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-08-25 17:44:14", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5af-2490-4b09-8a13-43ee02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1a99a2de-2373-4621-a8fb-3810a2d1e0b3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:18.000Z", "modified": "2018-03-13T13:44:18.000Z", "pattern": "[file:hashes.MD5 = 'b28f3ade5237a99db046b52d00a4e12c' AND file:hashes.SHA1 = 'f670e53a32369cba2da1efa3e0560b03b54fc56a' AND file:hashes.SHA256 = '90ca9d15eb5815f8b3302fc35c8c67fc7481198a1c91eb3970799fc3782eba6b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1d9c8849-48b1-4c5a-86c1-23c30aa5bd85", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:16.000Z", "modified": "2018-03-13T13:44:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/90ca9d15eb5815f8b3302fc35c8c67fc7481198a1c91eb3970799fc3782eba6b/analysis/1520439955/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5b1-43d4-4b6c-ab66-4c9002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5b1-a3f4-40b4-a67b-41ea02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:25:55", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5b1-f1b4-4cd9-a872-4dfd02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--98b8fd89-339b-4f7a-ab5b-9c386741f7f4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:20.000Z", "modified": "2018-03-13T13:44:20.000Z", "pattern": "[file:hashes.MD5 = 'd41be2ba18cd5e6326c6298caadac02b' AND file:hashes.SHA1 = '772d19b5c243256bc67f0ab7b9985adba7896ff5' AND file:hashes.SHA256 = 'e37bbf95ce83592f7c72d548842cb33be5d473bf1cb18dd9910edb9692fcf1b5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a255438b-ec32-4257-8de6-dc7a054f4126", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:19.000Z", "modified": "2018-03-13T13:44:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e37bbf95ce83592f7c72d548842cb33be5d473bf1cb18dd9910edb9692fcf1b5/analysis/1520488608/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5b3-ce64-479b-a616-4a6c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "53/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5b3-25b0-439c-877d-4fb902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:56:48", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5b3-fe98-441e-be9b-415702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--639a5e0f-c87f-4c39-bb1f-0443c6fe085f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:23.000Z", "modified": "2018-03-13T13:44:23.000Z", "pattern": "[file:hashes.MD5 = 'ec8bae15417dcc2ba4b92a03904ef297' AND file:hashes.SHA1 = 'f1879f675834d2ac2db61ca72033b5e7ef892881' AND file:hashes.SHA256 = 'f584ec598c2926ecd0ee48c84a0a4e6d780de993281f390f6f93f014649fd2f2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b70cf9ce-61c3-4cc0-84d1-d2848d3e98e8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:21.000Z", "modified": "2018-03-13T13:44:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f584ec598c2926ecd0ee48c84a0a4e6d780de993281f390f6f93f014649fd2f2/analysis/1520441343/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5b5-4558-4401-9ec9-4c3902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/50", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5b6-6418-4f78-8fc8-491802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:49:03", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5b6-1a64-489d-8bf6-425402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--baf077d1-6aca-4cbc-ba3f-33bda3b9411b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:25.000Z", "modified": "2018-03-13T13:44:25.000Z", "pattern": "[file:hashes.MD5 = '23eec7f5200a0a96372d42f862cb9ac0' AND file:hashes.SHA1 = '1792d418c1283c72997c8f119267437c3589316f' AND file:hashes.SHA256 = '8f29b3bc0ee8bdb00971576403db7854b3a59a8997fd7ccced8d23e834455d36']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--712481dd-995d-491f-b929-5e3322c631ec", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:23.000Z", "modified": "2018-03-13T13:44:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8f29b3bc0ee8bdb00971576403db7854b3a59a8997fd7ccced8d23e834455d36/analysis/1512451457/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5b7-f288-4b50-9530-4f1402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5b8-93b0-42d9-867e-491602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-05 05:24:17", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5b8-7660-43af-8f21-4e2f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--13d8d248-26dd-4144-a295-f5359295233d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:27.000Z", "modified": "2018-03-13T13:44:27.000Z", "pattern": "[file:hashes.MD5 = 'c9511b0a15b9c982718ae0b1e0233a1c' AND file:hashes.SHA1 = '1e2ff89055f785067ba277d29e8857b2ce3e7cf1' AND file:hashes.SHA256 = '112a5ebecf43d35c9e196e49dedd8c7763bc8d05b175383303f7ae81b3e90a16']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2a7d70a1-7b62-4ab4-8e52-eb2580366dfa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:25.000Z", "modified": "2018-03-13T13:44:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/112a5ebecf43d35c9e196e49dedd8c7763bc8d05b175383303f7ae81b3e90a16/analysis/1511906538/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5b9-dfb4-4597-9dc0-4d1602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5ba-fe70-4bc4-b1c5-464502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-28 22:02:18", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5ba-34dc-4531-90ac-486a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--be3b992c-a86f-4e3d-a44b-1e319fa67c66", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:29.000Z", "modified": "2018-03-13T13:44:29.000Z", "pattern": "[file:hashes.MD5 = '3caaa4e73ce36a5a784722e8f3414779' AND file:hashes.SHA1 = 'a8498b821900f38185d4c06020c1947c128e3386' AND file:hashes.SHA256 = 'f4b997725f499272c992b611b85db6b23f5b147319c0db0f093550178cbc1a17']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--34447c7d-838f-4cb6-b8d0-0a9f0a0af702", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:28.000Z", "modified": "2018-03-13T13:44:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f4b997725f499272c992b611b85db6b23f5b147319c0db0f093550178cbc1a17/analysis/1516397468/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5bc-6b74-44c9-b843-422002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "25/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5bc-7550-4671-9017-456502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-19 21:31:08", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5bc-d3bc-45bb-b4c6-45f102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2bd8f5ed-adf0-45ff-ada9-9bed3a4060ae", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:32.000Z", "modified": "2018-03-13T13:44:32.000Z", "pattern": "[file:hashes.MD5 = 'f74922ce7ac99535b83c3ade20f9b428' AND file:hashes.SHA1 = '982539d33a7944013a0754af637779e1d8b43c12' AND file:hashes.SHA256 = 'b1f2c4c3e837e4971a0cb2db3763e8785b0c34a65c073a890963b35ead55eff0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ac8f6787-b5f5-4ee6-b1a0-0b303f34ab29", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:30.000Z", "modified": "2018-03-13T13:44:30.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b1f2c4c3e837e4971a0cb2db3763e8785b0c34a65c073a890963b35ead55eff0/analysis/1520440524/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5be-a644-4e5f-8dcb-4d6e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5be-90b0-43b3-87bf-485e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:35:24", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5be-d54c-4f70-97e2-41f302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c41a3658-a663-4d02-96a1-31891e0a2b70", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:34.000Z", "modified": "2018-03-13T13:44:34.000Z", "pattern": "[file:hashes.MD5 = '545398e1262524708ea1b011d9117e32' AND file:hashes.SHA1 = 'cbced3cab25b1325becc8bb4dd8fd4e160be3886' AND file:hashes.SHA256 = '2b4b4ead7f8a7b11e126d8c6a4199163e8debe33ea3a0b86bba78f92a6ee1740']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0bdb8b75-3f37-4741-b0b9-5c45ed8f0468", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:32.000Z", "modified": "2018-03-13T13:44:32.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/2b4b4ead7f8a7b11e126d8c6a4199163e8debe33ea3a0b86bba78f92a6ee1740/analysis/1512188149/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5c0-af94-405f-b3d0-414302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5c1-ac00-4f44-9e8c-4ca402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-02 04:15:49", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5c1-9ca0-4bd4-9726-466702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d68f2720-4b5e-4632-a07c-161efaa36753", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:36.000Z", "modified": "2018-03-13T13:44:36.000Z", "pattern": "[file:hashes.MD5 = 'a1e180b43298009dc514931b025d48f6' AND file:hashes.SHA1 = 'ee70818c906af82d5cab313885695d3339546d98' AND file:hashes.SHA256 = '5d15801241768974654ef7f4bb2e5914a6fbf9b628421a237c64bd6031949a1a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--62a200f5-ada3-489e-8be4-0f841b49ccf1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:35.000Z", "modified": "2018-03-13T13:44:35.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5d15801241768974654ef7f4bb2e5914a6fbf9b628421a237c64bd6031949a1a/analysis/1507385515/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5c3-cac0-418c-97c3-414702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "43/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5c3-f6dc-418e-990f-441902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-10-07 14:11:55", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5c3-5cb4-43e7-a301-4b7502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2d4e2c18-2028-4f1e-a670-a518a678dd03", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:39.000Z", "modified": "2018-03-13T13:44:39.000Z", "pattern": "[file:hashes.MD5 = '981c80386599f9922c4f34fdc7a4d49a' AND file:hashes.SHA1 = '3935ba570fb257c255efd433251b2234b0a3f771' AND file:hashes.SHA256 = 'e112816a6380c8dd1c242ff911c2e59331615443fec86f5125e51ab10db1ad43']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9e3d433c-19c8-471a-a95e-f645423a88c3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:37.000Z", "modified": "2018-03-13T13:44:37.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e112816a6380c8dd1c242ff911c2e59331615443fec86f5125e51ab10db1ad43/analysis/1520324700/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5c5-7cb0-40ea-89c1-476802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5c5-cd9c-4393-bc8d-401602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 08:25:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5c5-13dc-44a5-bdaf-4dc802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1656bc8a-bb59-41ee-b95b-4d8c7709675b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:41.000Z", "modified": "2018-03-13T13:44:41.000Z", "pattern": "[file:hashes.MD5 = '557b1b7fc85e307b26f3cad2aabcfbbc' AND file:hashes.SHA1 = '4c9984a254c5c453a591fbc09edc916a43bec505' AND file:hashes.SHA256 = '9ab27bf6a30dd835d19c438bee3feeede1749c0ba9ef42fd601830f3950beab6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--93704ecb-f463-4722-92f8-61dea8ddeb24", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:39.000Z", "modified": "2018-03-13T13:44:39.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9ab27bf6a30dd835d19c438bee3feeede1749c0ba9ef42fd601830f3950beab6/analysis/1520870521/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5c7-11c0-4ee6-9101-4c0402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5c8-9af4-41d1-9ad4-409502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 16:02:01", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5c8-1dc8-4b21-9a78-49fa02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cf0a1d5f-2e78-44fb-8ca1-850ba3b02c9b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:43.000Z", "modified": "2018-03-13T13:44:43.000Z", "pattern": "[file:hashes.MD5 = '080f0040dbb1f961ff07cb924148d425' AND file:hashes.SHA1 = 'c8a9b0f2afd784ef175cbed50f467299597c3600' AND file:hashes.SHA256 = '5c40c4454fc289f9b240eb5419adce33b4b146753b5fb4404aaad4ca81ea24e6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ee2d4946-ea46-4614-929b-b892f9908209", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:41.000Z", "modified": "2018-03-13T13:44:41.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5c40c4454fc289f9b240eb5419adce33b4b146753b5fb4404aaad4ca81ea24e6/analysis/1520438755/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5c9-e5b8-4ca2-afa9-42ae02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5ca-9784-4f7f-bb1f-4d0102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:05:55", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5ca-d624-4a16-8c4a-475102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ee5ee3f3-5de5-420c-a078-ecb7b097731d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:45.000Z", "modified": "2018-03-13T13:44:45.000Z", "pattern": "[file:hashes.MD5 = '9c6e3682443464eb6dd47b837dc1c5b9' AND file:hashes.SHA1 = 'eaee53d4f5fbf876643c8081f22b015da4042df3' AND file:hashes.SHA256 = '6b5b633e0cf8ad1537f89e9783b2ce771b2097047af940856277d56a2b04bbcb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--db8dfdee-1040-4e3e-9c50-bafef41f9cd8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:44.000Z", "modified": "2018-03-13T13:44:44.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/6b5b633e0cf8ad1537f89e9783b2ce771b2097047af940856277d56a2b04bbcb/analysis/1520439053/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5cc-9b94-4f3f-882b-49a602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5cc-3df8-4014-93a7-493402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:10:53", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5cc-9cc0-4f3a-8c12-412502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0b5f6c32-9395-4cbd-a0bf-dd0d0530e2a8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:47.000Z", "modified": "2018-03-13T13:44:47.000Z", "pattern": "[file:hashes.MD5 = 'a0d15a805ea720104a81515ea4b5c3e3' AND file:hashes.SHA1 = 'd13fd2553351140c70b15d477c6805a1bc0dd71a' AND file:hashes.SHA256 = '7e1fa4807e9314f54b8c59d1fe9745412566b7c2d4fbcbef8078782d96f4e10b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--33eda59f-9e49-43f3-958d-a55e2a6f1166", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:46.000Z", "modified": "2018-03-13T13:44:46.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7e1fa4807e9314f54b8c59d1fe9745412566b7c2d4fbcbef8078782d96f4e10b/analysis/1513342535/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5ce-6278-41ae-9786-47f602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5cf-cca4-4f2e-b15b-4b1f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-15 12:55:35", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5cf-a5d0-4740-8744-497e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c1fb6054-0e84-4bb2-a205-389fc558673a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:50.000Z", "modified": "2018-03-13T13:44:50.000Z", "pattern": "[file:hashes.MD5 = '76e947dbc4f073a1f050eade9f73f8a4' AND file:hashes.SHA1 = 'bb485a1223e3ca242a3a9e07090f047cdfe0bd81' AND file:hashes.SHA256 = 'ae9457c1f954f6c53914a46c15c906e542a01b830bbddd61fc64ca76e13e4d09']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--40779d2d-1039-423f-a494-825d7952460d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:49.000Z", "modified": "2018-03-13T13:44:49.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ae9457c1f954f6c53914a46c15c906e542a01b830bbddd61fc64ca76e13e4d09/analysis/1520440445/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5d1-8840-4eea-bcc8-418102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5d1-8848-40df-9b9b-41ab02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:34:05", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5d1-b5f8-429b-bc6d-4cfc02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e77be68c-627e-49ae-97d4-e0905966779f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:52.000Z", "modified": "2018-03-13T13:44:52.000Z", "pattern": "[file:hashes.MD5 = 'f9b1cf4db2a9b022bfea3413dfdff615' AND file:hashes.SHA1 = 'c85e9fa793df5a67cce72a49aae59e9bc5679560' AND file:hashes.SHA256 = '538da0b115ebfa2e0b8d80f0dcfaf464afeff8f7dacb8d2db0d5938473704f64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e15aae65-2ce2-4bf1-bf9b-bf0b5f6a4b42", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:51.000Z", "modified": "2018-03-13T13:44:51.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/538da0b115ebfa2e0b8d80f0dcfaf464afeff8f7dacb8d2db0d5938473704f64/analysis/1520438676/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5d3-b4dc-473a-99f2-457602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5d3-c978-47e5-a251-4b9a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:04:36", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5d3-0178-4bc8-829c-436402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4d96769c-72ab-4627-b0d4-d0340cd5afb8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:55.000Z", "modified": "2018-03-13T13:44:55.000Z", "pattern": "[file:hashes.MD5 = '83965965da88067b506b2b16a9b84986' AND file:hashes.SHA1 = 'c46a4d1c96c0a5ab3621e7701c0321d244f10b69' AND file:hashes.SHA256 = '243b07e5f9880d126932a65ec2db49adef323b87a36ff91e6d2f811add6601d9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6a64e291-db27-4ab7-a4f1-d219c2d4a213", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:53.000Z", "modified": "2018-03-13T13:44:53.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/243b07e5f9880d126932a65ec2db49adef323b87a36ff91e6d2f811add6601d9/analysis/1520488421/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5d5-80bc-48ac-9ceb-4fd102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5d6-aa78-47f7-9efc-40bb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:53:41", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5d6-6b8c-4eb4-bd98-4c6402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--03ca8515-5a71-4777-af1a-d1ff1d6e5a8c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:57.000Z", "modified": "2018-03-13T13:44:57.000Z", "pattern": "[file:hashes.MD5 = '29ed5ffc729dc63f592d1b52fc987b7c' AND file:hashes.SHA1 = 'fb0595fae19be7710fef180425841699ac595559' AND file:hashes.SHA256 = 'b9c1901743e8ca362a8efb77f1fb895e924c3e8abc5161f2bb44182a0c12523c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0adc6624-4217-4fff-8afc-70515da5eb04", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:55.000Z", "modified": "2018-03-13T13:44:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b9c1901743e8ca362a8efb77f1fb895e924c3e8abc5161f2bb44182a0c12523c/analysis/1519371390/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5d7-0780-4ef2-b1db-499f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5d8-5898-49b0-9c31-4f5402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-23 07:36:30", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5d8-1800-47a6-92d9-465402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b842ab6c-0657-4c07-b5d6-7d84cddd0db5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:59.000Z", "modified": "2018-03-13T13:44:59.000Z", "pattern": "[file:hashes.MD5 = 'd4b6fc64a83cde8f4a8f58dadae2652e' AND file:hashes.SHA1 = 'd9ca71ac2e1074c9a7321d9d07a0f007ee74b860' AND file:hashes.SHA256 = 'eecfcd71ce7ec89f8d1b642c80106db2ccae5721bf88148031ce077a93172068']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:44:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--41092416-53fd-4ebc-9dd7-c561b27c71d3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:44:58.000Z", "modified": "2018-03-13T13:44:58.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/eecfcd71ce7ec89f8d1b642c80106db2ccae5721bf88148031ce077a93172068/analysis/1519360639/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5da-eda0-428e-825d-4bea02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5da-4f30-4aa4-97ce-4b0e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-23 04:37:19", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5da-bc88-4775-8607-4d3902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--501eb9d3-d927-4981-9a70-029446f915cc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:02.000Z", "modified": "2018-03-13T13:45:02.000Z", "pattern": "[file:hashes.MD5 = '6fecc17a139cf30c235f5d6e4b1b19e2' AND file:hashes.SHA1 = 'ee41391ce88ba4b7fc2db49f381d9a334c9fda53' AND file:hashes.SHA256 = '0b2428609aabb06f4379d5cd50e696147f824f4c7724e826064abe9368f5c76d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f7f485cf-39d2-496d-8559-26ac32cf9a49", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:00.000Z", "modified": "2018-03-13T13:45:00.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0b2428609aabb06f4379d5cd50e696147f824f4c7724e826064abe9368f5c76d/analysis/1520868661/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5dc-774c-47de-a5bd-400402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5dc-5670-4afb-9404-4bcb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 15:31:01", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5dd-cfa0-4afc-89d5-44be02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--471a7dbf-92c0-465f-ba18-05dfb063b09e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:04.000Z", "modified": "2018-03-13T13:45:04.000Z", "pattern": "[file:hashes.MD5 = '870611cf4fecc8326dda13d9d754f018' AND file:hashes.SHA1 = 'a22f432f0b37848bbae4a50b269fe5abe2d29ab1' AND file:hashes.SHA256 = '3faa0bf985680899b7ceeb5d9e8e502c1d65a113afd677d41b9f33447e46de83']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--df430360-e730-4f9f-bc3e-686429c7583a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:03.000Z", "modified": "2018-03-13T13:45:03.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3faa0bf985680899b7ceeb5d9e8e502c1d65a113afd677d41b9f33447e46de83/analysis/1520438249/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5df-0054-448f-b8f7-4f4e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5df-71ac-43b1-a766-423a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:57:29", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5df-04b8-4e95-8d17-4daa02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f01594da-861d-4f87-b396-47514fa8363b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:07.000Z", "modified": "2018-03-13T13:45:07.000Z", "pattern": "[file:hashes.MD5 = '15799b9275cd8f1ee781a1807ffa1965' AND file:hashes.SHA1 = '8542537a418d2f5a89a32ebd7f21e6f55c2186a8' AND file:hashes.SHA256 = '30ecdc16bf9d416a2729d20b1bc2da466e58512f501395484828ef3446a43686']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0b79ea19-b0d7-40b9-8776-a2a016033403", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:05.000Z", "modified": "2018-03-13T13:45:05.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/30ecdc16bf9d416a2729d20b1bc2da466e58512f501395484828ef3446a43686/analysis/1520446300/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5e1-fe4c-4e86-bc30-4fc702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5e1-32f0-415b-95a0-46b402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 18:11:40", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5e2-904c-45b9-bf3e-451902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dfa0759a-c600-44e9-9876-9917c0a250b4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:09.000Z", "modified": "2018-03-13T13:45:09.000Z", "pattern": "[file:hashes.MD5 = 'b59b442d0a9647f25063cf275e0bd7fd' AND file:hashes.SHA1 = '24f5559e152b8e2761c5a5a35a87b73cad34584c' AND file:hashes.SHA256 = '82903f14bcd5821f6b0f2682b1e0d32c77c760812b23811da0f1a3003917037a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5839cd4b-1637-4bb9-bb4f-d47ebed941c9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:08.000Z", "modified": "2018-03-13T13:45:08.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/82903f14bcd5821f6b0f2682b1e0d32c77c760812b23811da0f1a3003917037a/analysis/1520376450/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5e4-a7d0-451b-8a7a-499402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5e4-0594-4a31-82ec-481c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:30", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5e4-d264-4fe4-9325-4a8f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6b548802-ebdb-43a5-9401-d2f8f3028d08", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:12.000Z", "modified": "2018-03-13T13:45:12.000Z", "pattern": "[file:hashes.MD5 = '735eed3bd45110f9bc21dfb3bf3406a8' AND file:hashes.SHA1 = '296d79ab15c935818b5689d42da022803c8fd045' AND file:hashes.SHA256 = 'f03677848e924269e0c8f357ad56e96fb7d0875b6aef434779594e5fbeacb2aa']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4d3b0767-ca9c-4a59-b2b6-6b5d45774032", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:10.000Z", "modified": "2018-03-13T13:45:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f03677848e924269e0c8f357ad56e96fb7d0875b6aef434779594e5fbeacb2aa/analysis/1520874053/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5e6-af9c-495f-b16a-429c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5e6-b8d0-47b4-8a52-4d2d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 17:00:53", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5e6-6358-475b-a4f6-4f2102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bb56a8a6-e4d3-42d0-833f-e4361b54331a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:14.000Z", "modified": "2018-03-13T13:45:14.000Z", "pattern": "[file:hashes.MD5 = '402496b36984ba7d4f384e6d37f29e2f' AND file:hashes.SHA1 = 'bf781f9ca6bf84691af81afe2377f3e953dc6c98' AND file:hashes.SHA256 = 'cce6c0a11c9c10efbe0b7b6f5d8ca6150886188dc748c1d372358bd4e62cc720']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4d05714f-a5ef-4d4f-a006-8f30c4f980b6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:12.000Z", "modified": "2018-03-13T13:45:12.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cce6c0a11c9c10efbe0b7b6f5d8ca6150886188dc748c1d372358bd4e62cc720/analysis/1517681763/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5e8-d78c-48dd-a748-40ba02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "21/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5e9-5c44-4d25-b17b-43da02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-03 18:16:03", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5e9-4894-4cfe-a3b3-490e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1830e8c1-fd3c-4bf3-a1c8-62552d336b81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:16.000Z", "modified": "2018-03-13T13:45:16.000Z", "pattern": "[file:hashes.MD5 = 'edcb262923c5d492034f6db5dba88cc5' AND file:hashes.SHA1 = '49db9d14abe36ce23a24209eb3070038a6714e65' AND file:hashes.SHA256 = 'e15200f16ce6d15b4405184bd6fb3889731ba3de306844f76913113e26146cf2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8dc0fa9d-8101-4cfa-a7ca-708ad1e8641b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:14.000Z", "modified": "2018-03-13T13:45:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e15200f16ce6d15b4405184bd6fb3889731ba3de306844f76913113e26146cf2/analysis/1518701871/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5ea-abb8-40a6-a475-433002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5eb-8868-4455-a976-432f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-15 13:37:51", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5eb-5b4c-4727-9b8d-48da02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0f99173c-5e8d-4184-9112-90283901d5a7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:18.000Z", "modified": "2018-03-13T13:45:18.000Z", "pattern": "[file:hashes.MD5 = '6f02c3e46ba6bb331b9563eedb9a5d78' AND file:hashes.SHA1 = 'eaa72fe1c6c5d399040ef56e4aefb566de786815' AND file:hashes.SHA256 = '238ea3cc12020ad483279d363de6755d96a1fb2347b7d1815bb581514f2e9d9e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8f9ecfd9-d95a-4499-b479-443b63588110", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:17.000Z", "modified": "2018-03-13T13:45:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/238ea3cc12020ad483279d363de6755d96a1fb2347b7d1815bb581514f2e9d9e/analysis/1520437712/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5ed-7fe8-4e73-b0bf-413b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5ed-712c-428a-bcdf-438402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:48:32", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5ed-3d20-4853-8a41-428e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--34be655c-ccbd-4123-b790-0e89cdaed85d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:21.000Z", "modified": "2018-03-13T13:45:21.000Z", "pattern": "[file:hashes.MD5 = '6217b0f76209446747f02f379915acb4' AND file:hashes.SHA1 = '3a9c86ce483a1c05925f6fd602302d8015d7409b' AND file:hashes.SHA256 = 'cee3b79780438aadc98ea5b4229b754566430516e2792cc7d048fc472c4dbc79']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--86b97a0a-ae05-4885-9931-5adfba823b6e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:19.000Z", "modified": "2018-03-13T13:45:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cee3b79780438aadc98ea5b4229b754566430516e2792cc7d048fc472c4dbc79/analysis/1520488393/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5ef-29c8-42fa-89c8-4b3802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/57", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5f0-d584-426e-a400-468d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:53:13", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5f0-7778-4d20-9b17-4ea002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2f9ea31a-b956-4e72-9a09-e16343cfbff6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:23.000Z", "modified": "2018-03-13T13:45:23.000Z", "pattern": "[file:hashes.MD5 = '7fa388ba7c63a78a82614d80177c6580' AND file:hashes.SHA1 = '91471bd59351707ba3fb3e6ffe205063b53cfe57' AND file:hashes.SHA256 = '49d2c6c0ab28cc428c3e0dba54027de788d65d635e21577172fce0670c31a3d5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c298d324-80ca-47b6-839a-8194f675280e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:21.000Z", "modified": "2018-03-13T13:45:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/49d2c6c0ab28cc428c3e0dba54027de788d65d635e21577172fce0670c31a3d5/analysis/1520438407/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5f2-cc90-4fb0-bd00-490202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5f2-8390-4bd6-ba27-40c102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:00:07", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5f2-6268-4e54-94c0-403402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4b8152a1-9434-45eb-b87c-1e63940242d9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:25.000Z", "modified": "2018-03-13T13:45:25.000Z", "pattern": "[file:hashes.MD5 = 'dded59f51a5d04c60faea5fd6150661a' AND file:hashes.SHA1 = 'a73edebf73f202815466aedfb4c51bbefd217e4c' AND file:hashes.SHA256 = 'f2e0902e21abde220813e7a4ea68c7b6039e92cecf338a522739e0d03bbbca16']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3a193c9f-2212-4f1a-a4c5-4ad4c34c83c5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:24.000Z", "modified": "2018-03-13T13:45:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f2e0902e21abde220813e7a4ea68c7b6039e92cecf338a522739e0d03bbbca16/analysis/1520441290/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5f4-2468-41e4-92f3-4ce902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5f4-8308-4470-bda7-4bb202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:48:10", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5f4-e3f8-415a-a9fe-407d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8d352130-43c7-45ed-8071-f107683e85e2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:28.000Z", "modified": "2018-03-13T13:45:28.000Z", "pattern": "[file:hashes.MD5 = '94ec8bac411ca35917a304d48e8e6cd6' AND file:hashes.SHA1 = 'fc60bcd6b753cc65c7f3e333a7c5b3c9edd92222' AND file:hashes.SHA256 = '9a16fe595e5e8dbe0604fa4d307250e4f47a86e7793378b5df7b16891ff21bb1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--826f69c0-6353-407b-959a-6db753aa04cc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:26.000Z", "modified": "2018-03-13T13:45:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9a16fe595e5e8dbe0604fa4d307250e4f47a86e7793378b5df7b16891ff21bb1/analysis/1520871780/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5f6-ed60-4400-9412-40b902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5f7-0b2c-4015-8681-4a9a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 16:23:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5f7-ad9c-40fa-acf7-4c3a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--20c88590-7576-4c24-9aee-62d7609cbe8f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:30.000Z", "modified": "2018-03-13T13:45:30.000Z", "pattern": "[file:hashes.MD5 = 'd9525d04dd6bc18c6663ef95b9f13455' AND file:hashes.SHA1 = '1f35ddfd111bbc277cafc25e9d72f368d7fd3ff5' AND file:hashes.SHA256 = '7e0ff14ecaa2ac825c2161e1e859b25e33cca421d32de1cc009863bd049e98e1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e3268eb8-ff83-4c94-a785-62496de9011d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:28.000Z", "modified": "2018-03-13T13:45:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7e0ff14ecaa2ac825c2161e1e859b25e33cca421d32de1cc009863bd049e98e1/analysis/1520439479/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d5f8-e818-4ffb-9b06-43c802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "22/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5f9-2cec-4f9e-9f30-4fa202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:17:59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d5f9-b0a8-4f24-85ff-47dc02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b138ff77-a9a1-4c08-bafe-29b0523b4ed8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:32.000Z", "modified": "2018-03-13T13:45:32.000Z", "pattern": "[file:hashes.MD5 = '2d38b02e4f933a6218b01aaa92d4a44a' AND file:hashes.SHA1 = '1fab58aaf00a90b477fb1a82aeb05aff1a2adeb1' AND file:hashes.SHA256 = '4d9ea1cb63d187e1cddf0085a80944903e9e020f54cbeed5674b304ed4c664a7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--633551b4-10c9-4b6f-9016-48b408fe38a4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:31.000Z", "modified": "2018-03-13T13:45:31.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4d9ea1cb63d187e1cddf0085a80944903e9e020f54cbeed5674b304ed4c664a7/analysis/1511806876/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5fb-fcd0-47c7-8954-41cf02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5fc-a004-4518-8e1c-4a1c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-27 18:21:16", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5fc-103c-45f0-bc98-43ac02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d66b5ccd-9abd-4f3c-9568-1d70c53d9bc7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:35.000Z", "modified": "2018-03-13T13:45:35.000Z", "pattern": "[file:hashes.MD5 = '6a5a4e3f25eecc585aa291e4e99e3d6f' AND file:hashes.SHA1 = '94eb0cbff906043653b479a3f06a02e3d5181c25' AND file:hashes.SHA256 = 'acab9cc10a836c7b94613902e585867973984c10284a7cbabf046de205b4903e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e778b89e-a884-4832-abde-6ce011251693", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:33.000Z", "modified": "2018-03-13T13:45:33.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/acab9cc10a836c7b94613902e585867973984c10284a7cbabf046de205b4903e/analysis/1520440390/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d5fd-ab68-4d0b-8fc3-47e602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5fe-26b8-4200-8c62-42fc02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:33:10", "category": "Other", "comment": "Executable File", "uuid": "5aa7d5fe-f9b4-4dc0-92b6-453c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0892831f-a928-4d72-8fce-54a4e11fb7c2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:37.000Z", "modified": "2018-03-13T13:45:37.000Z", "pattern": "[file:hashes.MD5 = 'db72ec2a57f2c44beb5d061070e4a68b' AND file:hashes.SHA1 = 'a043c15992c164f4172d74e7a7c4c930af2e8eb6' AND file:hashes.SHA256 = '339db83eabcdaf0c4b922811e6f98b36a4d6dcccf7f03ac41e3455ca2701f754']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c1f6c155-6147-4028-ba1b-a80b9dd7ba04", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:36.000Z", "modified": "2018-03-13T13:45:36.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/339db83eabcdaf0c4b922811e6f98b36a4d6dcccf7f03ac41e3455ca2701f754/analysis/1520913480/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d600-5bb4-451f-a822-440402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d600-57d0-46c1-b450-4ccc02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:58:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d600-f300-45a5-9d55-441602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--db1caacc-9b02-4c97-91a3-e53e3e1a06dc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:40.000Z", "modified": "2018-03-13T13:45:40.000Z", "pattern": "[file:hashes.MD5 = '358f49d1dd28cfcc4cec5e0478629bd4' AND file:hashes.SHA1 = 'a31ec969ea034b3cadeab4658e6704344c2536dc' AND file:hashes.SHA256 = '6ea19ff6b921be796960f5c575f4021919d69172bc4fd848d70d65eb1fe23ea4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--43e01f3e-90be-425d-8ec7-de09b4b709be", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:38.000Z", "modified": "2018-03-13T13:45:38.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/6ea19ff6b921be796960f5c575f4021919d69172bc4fd848d70d65eb1fe23ea4/analysis/1517074199/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d602-7ef8-4de4-aed1-425902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d603-ff1c-4d5d-9680-41f302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-27 17:29:59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d603-c14c-4fe5-a504-42a802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--67b2d93a-98eb-4c8a-9d16-4ad49b550d26", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:42.000Z", "modified": "2018-03-13T13:45:42.000Z", "pattern": "[file:hashes.MD5 = '0e78e263228f83d9cda4ff038487b5ed' AND file:hashes.SHA1 = '51997034c8647d1c55e737d1dbfd645844bbb766' AND file:hashes.SHA256 = '86430ccbafcd1cc2282084bd416592756765d744cb6b78b6aedbb7de27da9ec3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3df48692-1aae-44e5-ab1d-8e3f51964c1a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:40.000Z", "modified": "2018-03-13T13:45:40.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/86430ccbafcd1cc2282084bd416592756765d744cb6b78b6aedbb7de27da9ec3/analysis/1520912417/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d604-84a8-4784-a4c4-4a6502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d605-8568-4900-9c03-4aeb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:40:17", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d605-40b0-4117-a451-4e7302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ae30abe7-aaf5-43b8-9a86-da761337167a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:44.000Z", "modified": "2018-03-13T13:45:44.000Z", "pattern": "[file:hashes.MD5 = '5ed2611022f85978be9c289ce9d56d3d' AND file:hashes.SHA1 = '3433141b9185994c842e0717945073291624dfc9' AND file:hashes.SHA256 = '31ab3210c37c18a594478fcf466a7d9438d44155e4a6d0ff06e2df1f9496384c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c8abd4d3-60c6-4618-844a-b449f10e295b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:43.000Z", "modified": "2018-03-13T13:45:43.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/31ab3210c37c18a594478fcf466a7d9438d44155e4a6d0ff06e2df1f9496384c/analysis/1519130063/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d607-bb70-4ff1-854a-4cbd02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "42/65", "category": "Other", "comment": "Executable File", "uuid": "5aa7d607-4034-44df-b350-4d8402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-20 12:34:23", "category": "Other", "comment": "Executable File", "uuid": "5aa7d607-5790-4d15-af9e-4e1002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--020da26b-fa49-4c8b-8c1f-1e9c9720417a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:47.000Z", "modified": "2018-03-13T13:45:47.000Z", "pattern": "[file:hashes.MD5 = '418a530d741325eee659d030ef26f991' AND file:hashes.SHA1 = 'd7b1e8e6b5a493b2449ccd978131729fa741dda1' AND file:hashes.SHA256 = 'ebed0b54c50962470c7e541ea3874b6ccf71812540edff4a06080f978900d840']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4b92ac74-45c4-4016-834b-d2bea2aa65e8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:45.000Z", "modified": "2018-03-13T13:45:45.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ebed0b54c50962470c7e541ea3874b6ccf71812540edff4a06080f978900d840/analysis/1520441051/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d609-43d0-4d13-bd58-498c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d60a-5510-47a7-8045-496902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:44:11", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d60a-961c-4205-82fe-406d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bcfb9a53-5b69-4ac4-a2ef-18fef63ea165", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:49.000Z", "modified": "2018-03-13T13:45:49.000Z", "pattern": "[file:hashes.MD5 = '626a6d77d70d570ab6145d4f3383969d' AND file:hashes.SHA1 = 'd17f1912afdf34993ade09f27cd7a52f4f725cc8' AND file:hashes.SHA256 = '2be736311b9fde1539cd73b19eb742f6871e423216d66dab66e7914af52fec19']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e49d9375-8dd5-4055-89fd-07955351f316", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:47.000Z", "modified": "2018-03-13T13:45:47.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/2be736311b9fde1539cd73b19eb742f6871e423216d66dab66e7914af52fec19/analysis/1520437847/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d60b-fe18-4432-b110-481a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d60c-19c0-460f-a212-427602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:50:47", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d60c-3d28-40e5-a6f7-410202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c008b064-faae-4e2d-b895-7a3386442500", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:51.000Z", "modified": "2018-03-13T13:45:51.000Z", "pattern": "[file:hashes.MD5 = '17e12614bf6f1b9cc80c1801de6a7b7d' AND file:hashes.SHA1 = 'acac5c2d464136ea0ea588a71f979bc24fdf2337' AND file:hashes.SHA256 = '1416ce19fb29b01b3e89752cd2470f9390fa76ddf6a2d54a6282e85bed7b4375']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6b181382-5e85-4d8d-8841-f7d56ba607a5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:50.000Z", "modified": "2018-03-13T13:45:50.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/1416ce19fb29b01b3e89752cd2470f9390fa76ddf6a2d54a6282e85bed7b4375/analysis/1520437524/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d60e-4fc0-4c41-b636-445c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d60e-adc4-4b10-8a9d-410202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:45:24", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d60e-8660-48c4-a8dd-4e4f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a1d90f3c-1df4-47d6-a972-60df22e745d9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:53.000Z", "modified": "2018-03-13T13:45:53.000Z", "pattern": "[file:hashes.MD5 = 'd4c70ce66f7597919e55943b42daea6b' AND file:hashes.SHA1 = 'bef6752b727d35b34e4786cde064ff8ef2c37a53' AND file:hashes.SHA256 = '741a68002907eb05a140dd4b1000b09f9ea9f0a9ccd6928e124db0e7c535b5bc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6477d441-4a92-4916-acd4-43b19d16a375", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:52.000Z", "modified": "2018-03-13T13:45:52.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/741a68002907eb05a140dd4b1000b09f9ea9f0a9ccd6928e124db0e7c535b5bc/analysis/1520439269/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d610-79b0-4624-8668-4d8302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d611-bf98-48c0-aa94-4a7702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:14:29", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d611-f4d8-4391-ae4e-4ea902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--83c71c43-77bc-4dc1-9ac8-164993129370", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:56.000Z", "modified": "2018-03-13T13:45:56.000Z", "pattern": "[file:hashes.MD5 = '56306399306bc0278db0c32af922340e' AND file:hashes.SHA1 = '13742ab82eec577264e3f8c8c4ffa5719b7165f6' AND file:hashes.SHA256 = '18a10852b14df97b69243b38b23a573cc89d7629115ee0fefbbd66a00078ea4f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1e276f55-5833-4810-8bfc-bbf15fb87297", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:54.000Z", "modified": "2018-03-13T13:45:54.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/18a10852b14df97b69243b38b23a573cc89d7629115ee0fefbbd66a00078ea4f/analysis/1513339772/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d612-6bec-48ec-b78a-4d5d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d613-17e0-43d1-a44c-432802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-15 12:09:32", "category": "Other", "comment": "Executable File", "uuid": "5aa7d613-cb68-489d-8622-4ac402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d66b49cb-0f4e-4fcb-8233-a006348455ee", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:58.000Z", "modified": "2018-03-13T13:45:58.000Z", "pattern": "[file:hashes.MD5 = '042dd0153da8b68629094e4695aa74d2' AND file:hashes.SHA1 = '48bea9e851b074105745080eafeae56ee77137e5' AND file:hashes.SHA256 = '31ac22dc5ed4f7245e3988d096ce8c78e8d8edb95ea83d419bfc5c0d6dcb8cfb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:45:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b7668932-8d26-4ac2-af13-2ed08885bcd6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:56.000Z", "modified": "2018-03-13T13:45:56.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/31ac22dc5ed4f7245e3988d096ce8c78e8d8edb95ea83d419bfc5c0d6dcb8cfb/analysis/1520585313/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d615-7cf0-4102-a146-412502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "22/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d615-54d8-4aac-9ad6-468002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-09 08:48:33", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d615-f030-450d-b520-4bb702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e9d100a3-05ab-49d1-b1c9-0e8f2383befa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:00.000Z", "modified": "2018-03-13T13:46:00.000Z", "pattern": "[file:hashes.MD5 = '956b708fbf82afa013e4e8ee31b0e5ac' AND file:hashes.SHA1 = '573f10925e7626d8e54fd9240b434e43cb906603' AND file:hashes.SHA256 = '7ae9929902023ab4458ec482e9a5cb701e68862b2a1168fba6fa8b6a3e784866']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b35d1dc0-4300-4cc1-902a-5d9b046400df", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:45:59.000Z", "modified": "2018-03-13T13:45:59.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7ae9929902023ab4458ec482e9a5cb701e68862b2a1168fba6fa8b6a3e784866/analysis/1520852520/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d617-ed7c-4ac5-b5cc-496502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d617-c310-43c3-b76e-434302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 11:02:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d617-01e8-4a77-951e-455602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fe995598-bd9e-409f-8ea4-c08712c1b9de", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:02.000Z", "modified": "2018-03-13T13:46:02.000Z", "pattern": "[file:hashes.MD5 = '9c6c68f27bb9c2d83d75ae9aae8565c9' AND file:hashes.SHA1 = '4b6dcb1fecaa1058b61ab9e43fd57ffce16bd5ff' AND file:hashes.SHA256 = '123fcc8bc29c954002a10a992633d143f0496bf7b942bef6741aae761cc9667c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--10484feb-f108-437b-9229-acfc6b10217a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:01.000Z", "modified": "2018-03-13T13:46:01.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/123fcc8bc29c954002a10a992633d143f0496bf7b942bef6741aae761cc9667c/analysis/1520437445/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d619-5534-4a7d-a772-453a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d619-c530-42da-adf9-4bfb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:44:05", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d619-4678-4824-a518-456902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ed1c5751-bee4-4a8c-97d2-a0073741bbe5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:05.000Z", "modified": "2018-03-13T13:46:05.000Z", "pattern": "[file:hashes.MD5 = 'b220c0e88b353e74bb1ecaa118fe77de' AND file:hashes.SHA1 = '1f3289c1d072dc5759cfbeb46ae4a09dc3e7dda2' AND file:hashes.SHA256 = '1e8d3218fc242a82f105bdd1af3e5e6cc6865be66241914d0d51b332c71298f4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--72f27ad6-4f8e-4276-b7fd-287b9d809f48", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:03.000Z", "modified": "2018-03-13T13:46:03.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/1e8d3218fc242a82f105bdd1af3e5e6cc6865be66241914d0d51b332c71298f4/analysis/1520437604/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d61b-c75c-4ce6-89f0-40ad02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d61c-7be0-451e-a269-4f3902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:46:44", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d61c-6e30-4169-b71d-4c3d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--42a8a23c-9b54-4482-8a50-046820505d98", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:07.000Z", "modified": "2018-03-13T13:46:07.000Z", "pattern": "[file:hashes.MD5 = '818c52a7dc1d480fc4268255d7e5360c' AND file:hashes.SHA1 = '9f47fb8cc840e4ba3d84ea25854dc122ef58e949' AND file:hashes.SHA256 = '17cf8baece726646732d14c54c565bb27c941145d10803809ade30280634e24a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5fb36872-a865-41f8-bb2c-3aa9e2706869", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:06.000Z", "modified": "2018-03-13T13:46:06.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/17cf8baece726646732d14c54c565bb27c941145d10803809ade30280634e24a/analysis/1520437551/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d61e-03c0-4bc7-aa1e-4c2902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d61e-da44-458b-8d48-446302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:45:51", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d61e-b960-4149-b203-48bc02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7ed9d6ef-d823-437d-8281-4c9949d2b6b0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:10.000Z", "modified": "2018-03-13T13:46:10.000Z", "pattern": "[file:hashes.MD5 = 'f95babdf71bcb4e5b199a72b16d1b4da' AND file:hashes.SHA1 = '104041242626fb8f6138d88c0e8a673e3942f102' AND file:hashes.SHA256 = 'ddd0869bbe3586a18e728396fa3e77bdd794f4cf86584d92e0d6796d02672f68']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7f6d2249-26cc-4a41-8db2-19b133559d95", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:08.000Z", "modified": "2018-03-13T13:46:08.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ddd0869bbe3586a18e728396fa3e77bdd794f4cf86584d92e0d6796d02672f68/analysis/1519331035/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d620-c1b0-45fa-a279-41f402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d620-2440-4471-b00c-47bc02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-22 20:23:55", "category": "Other", "comment": "Executable File", "uuid": "5aa7d620-7504-4fa6-9d43-4ebe02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9495bd5e-39d9-40da-951a-008a0f307829", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:12.000Z", "modified": "2018-03-13T13:46:12.000Z", "pattern": "[file:hashes.MD5 = '063c4967213a893249516d86de90a0b9' AND file:hashes.SHA1 = '43dc4755df874b3ff6af1d30162ef8930e44a0e7' AND file:hashes.SHA256 = 'd2a74a18a10e03fa27fbd7f954befa11ae39688e9380cfa6ea5edc7c5f2fe02a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7a0ea506-37ef-4646-97d7-5574970b30b6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:10.000Z", "modified": "2018-03-13T13:46:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d2a74a18a10e03fa27fbd7f954befa11ae39688e9380cfa6ea5edc7c5f2fe02a/analysis/1513889377/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d622-2774-4542-9b27-45ac02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "45/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d623-a144-4de9-aee2-49bb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-21 20:49:37", "category": "Other", "comment": "Executable File", "uuid": "5aa7d623-26b4-4a8e-99dd-406302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2f57ac50-c7c9-4a20-b794-a714dc18fd80", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:14.000Z", "modified": "2018-03-13T13:46:14.000Z", "pattern": "[file:hashes.MD5 = '205720c215a3620830a6d03eca23fa56' AND file:hashes.SHA1 = 'e2483d6ab38718d649d00b4a9f53366e93012f0f' AND file:hashes.SHA256 = '29e66d89af2621339273b64b45014e661710361591c514b950092be82e5222ba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--43401fe1-3ad8-4d5e-ae34-03c4e6b1187b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:12.000Z", "modified": "2018-03-13T13:46:12.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/29e66d89af2621339273b64b45014e661710361591c514b950092be82e5222ba/analysis/1520437821/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d624-2ba4-4a7a-ada5-471d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d626-d280-4e60-b798-448f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:50:21", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d626-0498-4ba2-9303-42ce02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--174ec337-9a50-4f85-8127-3a95078ecd00", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:17.000Z", "modified": "2018-03-13T13:46:17.000Z", "pattern": "[file:hashes.MD5 = '147b20ddc572866fe34695b79fb70047' AND file:hashes.SHA1 = 'b5c236c5040ecf8c24a09c47ae73307953fc130f' AND file:hashes.SHA256 = 'ae81c89e16a9e3fbff5b2054441c090afdf659470127b79f9662a5a12732049c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9e6aba26-4bc6-4749-9af1-5e33710786ba", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:16.000Z", "modified": "2018-03-13T13:46:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ae81c89e16a9e3fbff5b2054441c090afdf659470127b79f9662a5a12732049c/analysis/1520376465/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d628-8770-46b3-8da8-43d602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d628-d988-411b-b04c-41ca02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:45", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d628-130c-4587-8f45-479102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d60d4a1a-e213-4e2a-a245-02347da28512", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:19.000Z", "modified": "2018-03-13T13:46:19.000Z", "pattern": "[file:hashes.MD5 = '9845ccaaf3c4fe109bda24adc6b93dbf' AND file:hashes.SHA1 = 'd229149bc19716ec4edaf3be9929706116953cc0' AND file:hashes.SHA256 = 'eafc44e91530127b5ac46763dc14015963b77c2c52846ec7da42c50ecbaabb54']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--87acea24-f544-414b-9337-4aa282031caa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:18.000Z", "modified": "2018-03-13T13:46:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/eafc44e91530127b5ac46763dc14015963b77c2c52846ec7da42c50ecbaabb54/analysis/1520441024/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d62a-c1d0-4fb9-8bcd-4d6002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d62a-3434-4391-b216-408e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:43:44", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d62a-2f10-44d9-953d-4a2002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7f797fe4-795e-4152-94a5-ca85ad81e2e9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:22.000Z", "modified": "2018-03-13T13:46:22.000Z", "pattern": "[file:hashes.MD5 = '0d4c1fc61258263a829d21e99affc6cd' AND file:hashes.SHA1 = '31b6714de2f8087067c2454d72b91c72dc8c0562' AND file:hashes.SHA256 = 'fa9beaf7e8eb887f46ed584d2bb5b79f3c0fe5d57d6a5aecbdc7f6093c316eb8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0df2e9df-4106-48f7-9f4f-6bf91b431e11", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:20.000Z", "modified": "2018-03-13T13:46:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/fa9beaf7e8eb887f46ed584d2bb5b79f3c0fe5d57d6a5aecbdc7f6093c316eb8/analysis/1518615635/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d62c-53e8-4dae-b4e5-408e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d62c-f948-48f3-a2da-48b402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-14 13:40:35", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d62c-bdec-457d-a260-4cdd02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--46998b72-d9b5-4392-868d-0c843d34fc00", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:24.000Z", "modified": "2018-03-13T13:46:24.000Z", "pattern": "[file:hashes.MD5 = 'c1bf4051aaf7f5b78d5825c333769c3f' AND file:hashes.SHA1 = '2c61002849ee203cc068f5360875096a2c14fb60' AND file:hashes.SHA256 = 'baf336f2048ed4de6b342d4cdf8b6ca4a95cf83167c2f2c044c12fd85923ed87']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f98f0864-6f07-45b0-b0f4-0c88c07dffb0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:22.000Z", "modified": "2018-03-13T13:46:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/baf336f2048ed4de6b342d4cdf8b6ca4a95cf83167c2f2c044c12fd85923ed87/analysis/1520440788/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d62e-a060-4d40-8d47-419302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d62f-f8a8-4bd9-becb-483302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:39:48", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d62f-9828-49bf-a448-481302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--80685b00-a882-4132-9551-286ab3b430c2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:26.000Z", "modified": "2018-03-13T13:46:26.000Z", "pattern": "[file:hashes.MD5 = 'b06572a6b4f3261b6cf355225b7d139c' AND file:hashes.SHA1 = '7873067b2442d577078d6bba33838e750dd422ef' AND file:hashes.SHA256 = 'f6546f3a9fb403743f9ab72ed5c8e9cc63f26bc65f4fbd7139e4adbb12e854b8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bbdca7b6-37ed-4ae2-aace-f71b4c8ac0c0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:24.000Z", "modified": "2018-03-13T13:46:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f6546f3a9fb403743f9ab72ed5c8e9cc63f26bc65f4fbd7139e4adbb12e854b8/analysis/1520851560/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d630-1990-4b64-8765-436602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d631-2720-422b-b831-48f602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 10:46:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d631-cf5c-4ac1-9123-44a902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2f15384f-e5ea-4e02-851b-9ecbf3508149", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:28.000Z", "modified": "2018-03-13T13:46:28.000Z", "pattern": "[file:hashes.MD5 = '1ccf78d8a3a539c1fc9e599ebb49ed78' AND file:hashes.SHA1 = '1b2e9fd7a60ca82fdb5575d85fa8659f5c64f9fe' AND file:hashes.SHA256 = '610e32c6dbf24f80c6a20648a139b06ee9ef255178feb8c788e29bced4016443']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f1bdcb12-3b65-4f80-8ee4-063b9b5b66f7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:27.000Z", "modified": "2018-03-13T13:46:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/610e32c6dbf24f80c6a20648a139b06ee9ef255178feb8c788e29bced4016443/analysis/1520904300/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d633-363c-4c85-ab4d-4d5c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d633-4ba0-4927-9e16-43fc02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 01:25:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d633-3ebc-4339-8d61-401402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2b0031ea-445e-4619-98be-8c0059ec1b62", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:31.000Z", "modified": "2018-03-13T13:46:31.000Z", "pattern": "[file:hashes.MD5 = '16842e774adef1ac9aae92acfb7c21a2' AND file:hashes.SHA1 = 'a93ac88b5d7a9743ad53b6744b62a326f0fe3926' AND file:hashes.SHA256 = 'a95b7e80425bee413ac5a022bca996ad0cd2bd18ed5db7fbe6c0769c5399a163']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3bbcd9ed-3e47-470c-b431-e70443010365", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:29.000Z", "modified": "2018-03-13T13:46:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a95b7e80425bee413ac5a022bca996ad0cd2bd18ed5db7fbe6c0769c5399a163/analysis/1513105466/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d635-d2c4-48e0-b3b4-442702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "53/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d635-2374-48fc-968c-4dc902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-12 19:04:26", "category": "Other", "comment": "Executable File", "uuid": "5aa7d636-42c8-4dbf-a851-4a3e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9a1ed464-4795-470b-820d-77ebba0fd9de", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:33.000Z", "modified": "2018-03-13T13:46:33.000Z", "pattern": "[file:hashes.MD5 = 'f742d92e42d813aa45c995203a423f90' AND file:hashes.SHA1 = '1dea7d6f21622f3fc0a5385dcbd6268e89dc2273' AND file:hashes.SHA256 = '7aeeb897d0c1de47500ea23b65a2266e7239f2b061ef4aa8989164a4e99e94bc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8e4dd566-7edf-49a9-8dc7-294cd59c3b80", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:31.000Z", "modified": "2018-03-13T13:46:31.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7aeeb897d0c1de47500ea23b65a2266e7239f2b061ef4aa8989164a4e99e94bc/analysis/1520913602/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d637-7f08-43c8-b11e-418602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d638-9e20-47b7-b2af-49c302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 04:00:02", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d638-0e14-4315-8d90-406502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--436515ee-125b-445a-b9bd-0326cc980910", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:35.000Z", "modified": "2018-03-13T13:46:35.000Z", "pattern": "[file:hashes.MD5 = 'b0d0b281554f8fbe9f6af749a0bd9239' AND file:hashes.SHA1 = '5be7b445857ba4091ca81b768dba7e09698fce76' AND file:hashes.SHA256 = 'ebf4d1f9396d6ab1aff5b3cc6c8e682e1291c49bbbe51ac5c797dc252833909f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7b789516-52af-42e3-a4d8-402725bebbad", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:33.000Z", "modified": "2018-03-13T13:46:33.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ebf4d1f9396d6ab1aff5b3cc6c8e682e1291c49bbbe51ac5c797dc252833909f/analysis/1514997355/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d63a-8bf8-401d-a221-4be202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d63a-f360-4cbf-98cc-459c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 16:35:55", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d63a-1a98-4876-9a10-4ab002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c18d5005-8d30-4b08-8b79-5471964d2686", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:37.000Z", "modified": "2018-03-13T13:46:37.000Z", "pattern": "[file:hashes.MD5 = '2f3ee38a8d58a817e71a10290fd395d3' AND file:hashes.SHA1 = 'c824572107a9f2ffd7af7d261a493d1f11f6e950' AND file:hashes.SHA256 = '5f654112de0cafea313816ab3ef06818b438997b94fc28cb62474c17a3426f4c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--aad037d0-ccc1-42ad-9e22-b00255d02d6b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:36.000Z", "modified": "2018-03-13T13:46:36.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5f654112de0cafea313816ab3ef06818b438997b94fc28cb62474c17a3426f4c/analysis/1520438860/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d63c-a0b0-4420-964f-4fd202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d63c-b25c-47ce-afad-476602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:07:40", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d63c-b454-4e47-ad6c-4fe002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f21c8928-a0ce-47df-af6d-1dc4800e6684", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:40.000Z", "modified": "2018-03-13T13:46:40.000Z", "pattern": "[file:hashes.MD5 = 'd1a46675e3a0e0cfc0d32befa3e78219' AND file:hashes.SHA1 = 'ecc8aaedf0042bb42fb2eb1ad3c718c340de2ae0' AND file:hashes.SHA256 = 'b7475b1e27ee13d5ca7a59186fd6621bda2632910a2c4bf3117acf4e441b9b94']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--092b2e56-e71f-407e-ae75-1048d5d294aa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:38.000Z", "modified": "2018-03-13T13:46:38.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b7475b1e27ee13d5ca7a59186fd6621bda2632910a2c4bf3117acf4e441b9b94/analysis/1520855460/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d63e-ef54-4c9d-a609-420902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d63f-9cfc-41b5-9334-47c302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 11:51:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d63f-06b0-4e3c-a071-4ac002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--26ed6d13-7ede-45a0-9d75-8484cbe26f82", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:42.000Z", "modified": "2018-03-13T13:46:42.000Z", "pattern": "[file:hashes.MD5 = 'a638f383936817b70f03d98f393874a2' AND file:hashes.SHA1 = '91928391f226f482f876e3ff46e68cee34ba7724' AND file:hashes.SHA256 = '1770d63f6ca452aa3afe77690c956fbbb0d5ae186fc82c0d14730820f9b7bb6c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3bc35d8c-6cd4-4946-bde4-deae4dae2192", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:41.000Z", "modified": "2018-03-13T13:46:41.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/1770d63f6ca452aa3afe77690c956fbbb0d5ae186fc82c0d14730820f9b7bb6c/analysis/1520919064/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d641-4784-46d2-9332-408502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "61/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d641-e860-4a62-b0a1-444c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 05:31:04", "category": "Other", "comment": "Executable File", "uuid": "5aa7d641-0858-402c-bdce-4d0f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a378e561-df52-488b-8b61-9c31848fd405", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:44.000Z", "modified": "2018-03-13T13:46:44.000Z", "pattern": "[file:hashes.MD5 = '18072a813d847b2c4e2d6cab4646fc2e' AND file:hashes.SHA1 = '2d5270e9236ad433cee634eee8b36f8aa9591ecf' AND file:hashes.SHA256 = '86b826543a4e343cf2ecc8f8279b859aadf5034a25613d30eb13d8f4f1d8cd57']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5d9c9579-9bac-42fe-b4d7-d2c99c2e7f26", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:43.000Z", "modified": "2018-03-13T13:46:43.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/86b826543a4e343cf2ecc8f8279b859aadf5034a25613d30eb13d8f4f1d8cd57/analysis/1519924151/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d643-c5b4-4743-bdfe-458f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d643-7c30-43f2-92bc-43df02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-01 17:09:11", "category": "Other", "comment": "Executable File", "uuid": "5aa7d643-6ec4-4d32-b141-4d0a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1fc063d9-da6f-49e5-9aec-04541560882f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:47.000Z", "modified": "2018-03-13T13:46:47.000Z", "pattern": "[file:hashes.MD5 = 'ca993e621abb242da648fef55fa0c4ed' AND file:hashes.SHA1 = 'cb673ead682f7eaffaeb369cd9105cb3f03b5414' AND file:hashes.SHA256 = '4fbecaa6c190937aac19adc6ec5599a7056305ffebe65015e22da2a324c7c114']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c66e9d99-b3ee-4276-9bc4-e16197dc1343", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:45.000Z", "modified": "2018-03-13T13:46:45.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4fbecaa6c190937aac19adc6ec5599a7056305ffebe65015e22da2a324c7c114/analysis/1520376437/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d645-45e4-4ce1-b960-450a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d645-0de4-4d29-b4ac-4f5202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:17", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d645-a0dc-4ece-a7af-49dc02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a2d020e6-f709-4ed7-9c48-90d666c9f95b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:49.000Z", "modified": "2018-03-13T13:46:49.000Z", "pattern": "[file:hashes.MD5 = '04fede85e14161a16a28dc7fa89c248f' AND file:hashes.SHA1 = '44cfc28a5efecd154f7fed76bc8751af232f0815' AND file:hashes.SHA256 = '924b32b407b44c7ff6788004120cd85d410648a04cd6f5360db3e199e6c82a04']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--164fe582-c64d-4e47-ae0d-a7dcd9ee6410", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:47.000Z", "modified": "2018-03-13T13:46:47.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/924b32b407b44c7ff6788004120cd85d410648a04cd6f5360db3e199e6c82a04/analysis/1520440017/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d647-73a0-49e8-8fa1-49a502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "42/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d648-15d4-4af3-80fd-458802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:26:57", "category": "Other", "comment": "Executable File", "uuid": "5aa7d648-a5c0-47d4-b962-45af02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d012ed78-ce5b-4169-9631-e80bd8e8f78e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:51.000Z", "modified": "2018-03-13T13:46:51.000Z", "pattern": "[file:hashes.MD5 = '3d9f55e878c149ef34e09b9f25f88de6' AND file:hashes.SHA1 = 'f1d79033bbf89e66a196af626ff881f7e874ce84' AND file:hashes.SHA256 = '0accb1cd97ab92a9b4b8829a36e081ba8c5ab8944928d79502aff2f141dd999c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--039c4cb6-78a0-4ee5-89c2-4e3fbb5d9db8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:50.000Z", "modified": "2018-03-13T13:46:50.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0accb1cd97ab92a9b4b8829a36e081ba8c5ab8944928d79502aff2f141dd999c/analysis/1520376417/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d64a-dae0-40b3-9a09-469b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d64b-2294-4593-959c-466a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:46:57", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d64b-7d98-474a-94fd-4a1302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f0892f76-ec4f-4948-b54f-a7e56ee990ed", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:54.000Z", "modified": "2018-03-13T13:46:54.000Z", "pattern": "[file:hashes.MD5 = '00f542f2bf878c1c3a48c6bcde52c53f' AND file:hashes.SHA1 = '83664d54acb330ca53562c191a22780cab6ffbec' AND file:hashes.SHA256 = 'de1499522ca82e52c9b05fc00254634191de681a19b80be5823bbf38df0f569f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--90685d7c-a0d2-4413-894e-7c1d95f10924", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:52.000Z", "modified": "2018-03-13T13:46:52.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/de1499522ca82e52c9b05fc00254634191de681a19b80be5823bbf38df0f569f/analysis/1520910780/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d64d-ecc0-4c22-8486-4e1502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d64d-0640-4a84-9b43-4f6102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:13:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d64d-d62c-4e45-900d-4ec302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e55e7446-e0ac-4f7e-b4a7-7de1d3a96e50", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:56.000Z", "modified": "2018-03-13T13:46:56.000Z", "pattern": "[file:hashes.MD5 = '802be047127b51467ae4300276a6f2d8' AND file:hashes.SHA1 = '1139780b91c6052cfcc2ac8f41df55855bccbef3' AND file:hashes.SHA256 = 'd5d0afc9b0697ddbf097e4704c0e4818b09a3f195b88f276b57f3e665352d7c9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9c601eec-34f8-4883-ad4c-991beb9c5313", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:55.000Z", "modified": "2018-03-13T13:46:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d5d0afc9b0697ddbf097e4704c0e4818b09a3f195b88f276b57f3e665352d7c9/analysis/1519650948/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d64f-81c8-4b4a-8e90-480802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d64f-fef8-4aea-b5dc-440a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-26 13:15:48", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d64f-0a7c-4ea0-af92-4ab802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f1bc257b-1f9f-4ffe-86be-35ffd892f3b0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:59.000Z", "modified": "2018-03-13T13:46:59.000Z", "pattern": "[file:hashes.MD5 = '65783e3a26527fc07f3bbe65d546383c' AND file:hashes.SHA1 = '7557fbbe757946ed3d519abd470fc951d6b2cd60' AND file:hashes.SHA256 = '9894ba3b6c110bcd9b245058f8cdd8943cb7515b53cabe7589368de005cfcbd7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:46:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c7bfc277-b689-4282-a52b-723f92964fb0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:46:57.000Z", "modified": "2018-03-13T13:46:57.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9894ba3b6c110bcd9b245058f8cdd8943cb7515b53cabe7589368de005cfcbd7/analysis/1520823298/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d651-0258-4c95-b035-46cb02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d652-0700-4bf0-8080-4b7102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 02:54:58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d652-5a94-415e-b02f-452602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b9b8ff6a-80a9-40a8-aa1e-000583538507", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:01.000Z", "modified": "2018-03-13T13:47:01.000Z", "pattern": "[file:hashes.MD5 = 'b90d43982901803c61b3ab1132e37676' AND file:hashes.SHA1 = '8bc267785b484d54047ec8352995b3b0dd8ea85d' AND file:hashes.SHA256 = '98861a1dd370bcfee107017e75cf1d527fbe8845181042de3493d0d0e7a624ca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bc28e52a-d2b1-4db5-98b2-b78814197fd0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:00.000Z", "modified": "2018-03-13T13:47:00.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/98861a1dd370bcfee107017e75cf1d527fbe8845181042de3493d0d0e7a624ca/analysis/1520440123/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d654-f248-42e3-8aeb-444202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d654-7078-40af-8b71-4ef102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:28:43", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d655-7f50-44b5-b8e7-449902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5557a9c2-2926-4aa6-9091-3871ebd874d7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:04.000Z", "modified": "2018-03-13T13:47:04.000Z", "pattern": "[file:hashes.MD5 = 'c2636850a5306da92d9271b33436ede9' AND file:hashes.SHA1 = '209379ab9568c30d485e98e76f221ec5a5e3b995' AND file:hashes.SHA256 = 'de9bfa660708b04c9519c9ca7d36cd5c6b9dd5b448cc0ee01b0ca846ee381965']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7888f078-6e6f-40d0-b426-fbf99c5e25ce", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:02.000Z", "modified": "2018-03-13T13:47:02.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/de9bfa660708b04c9519c9ca7d36cd5c6b9dd5b448cc0ee01b0ca846ee381965/analysis/1517620908/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d656-8c50-45c2-b4d2-4cd402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d657-aba8-4039-82e9-41d502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-03 01:21:48", "category": "Other", "comment": "Executable File", "uuid": "5aa7d657-336c-44c9-a26c-4eb502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d9764fb8-d509-4b1a-9b6f-434bee32f6e3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:06.000Z", "modified": "2018-03-13T13:47:06.000Z", "pattern": "[file:hashes.MD5 = '9b6b92395d9cf055dab9b7e66f846ee5' AND file:hashes.SHA1 = '0bf1aff8aba805b348731ed52b047aa2e0982147' AND file:hashes.SHA256 = 'ab0f7d145f178f26444e9c5b1815911131a7f6ba4b41647280320a363e626b1a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--99b98df2-668d-495e-b127-d171c1d9d3c8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:05.000Z", "modified": "2018-03-13T13:47:05.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ab0f7d145f178f26444e9c5b1815911131a7f6ba4b41647280320a363e626b1a/analysis/1514997432/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d659-bd50-4d7e-a566-439202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d659-fb6c-46d2-a754-42bf02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 16:37:12", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d659-5488-402c-8756-454202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--64348811-02d2-43c3-a49e-65a3d4491dcb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:09.000Z", "modified": "2018-03-13T13:47:09.000Z", "pattern": "[file:hashes.MD5 = '32d095989392b0aa877729ca11e66e60' AND file:hashes.SHA1 = '9c3774494d1a4550276d7507aa9e77409d302b1e' AND file:hashes.SHA256 = 'ecb914fcb7ac970616768bf7ec7c8fdb27512fe0d1ae00980e6070b1226d95bb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--521302dd-bf8c-4040-a8f9-026216bf0ada", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:07.000Z", "modified": "2018-03-13T13:47:07.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ecb914fcb7ac970616768bf7ec7c8fdb27512fe0d1ae00980e6070b1226d95bb/analysis/1520913594/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d65b-d630-4b33-9f25-419002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d65c-5f98-4515-81c8-497802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:59:54", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d65c-62ac-4216-906a-4f5102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56e47645-eac8-4997-a5cf-32192544f4ea", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:11.000Z", "modified": "2018-03-13T13:47:11.000Z", "pattern": "[file:hashes.MD5 = '30b8e6329ff713d6146aaf182a0a3571' AND file:hashes.SHA1 = 'aaf0772395e71ac80fc4f2beb25f0f48c5354905' AND file:hashes.SHA256 = '504af6417f1d6f4307b046f70104d604b3762bacefb6f4eafedcc35a9fc7d35f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f6103ca7-a9aa-454d-be10-d6fbc27699f1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:09.000Z", "modified": "2018-03-13T13:47:09.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/504af6417f1d6f4307b046f70104d604b3762bacefb6f4eafedcc35a9fc7d35f/analysis/1520438514/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d65d-d478-4f9f-85ed-44a802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d65e-46a8-402f-bb96-4a9502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:01:54", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d65e-6500-419b-8c2a-42ac02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--31f4b6b6-e16e-41a5-9f5f-d451220d62f3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:13.000Z", "modified": "2018-03-13T13:47:13.000Z", "pattern": "[file:hashes.MD5 = '3a58e1ecf150a64992b851b7142d895c' AND file:hashes.SHA1 = '4d022d61ff4b5935a67754ecf030bba117c63128' AND file:hashes.SHA256 = 'a65093c35d1647563f840e42893d09809311f34c3861c2c9db479109ee31df37']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2ae0b87d-3b07-4a7d-a8f3-280f94879967", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:12.000Z", "modified": "2018-03-13T13:47:12.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a65093c35d1647563f840e42893d09809311f34c3861c2c9db479109ee31df37/analysis/1520418218/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d660-21cc-4ac1-a912-4d7402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d660-7ec8-4b27-8335-4e5f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 10:23:38", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d660-6a90-4472-bff5-438002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--32d62c01-a77d-4a61-91e2-e479232e89fa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:16.000Z", "modified": "2018-03-13T13:47:16.000Z", "pattern": "[file:hashes.MD5 = 'b7060ec29c4020b340be54997845187d' AND file:hashes.SHA1 = 'c46cbf8fb7b6066e4a9b2ffd6daf52eb1395e801' AND file:hashes.SHA256 = 'ce53701bddcc24071c55b2b02c79508276b3c69444275f994c0fe690c63b8df8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f4223054-bc53-4228-92bf-02380266e4d5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:14.000Z", "modified": "2018-03-13T13:47:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ce53701bddcc24071c55b2b02c79508276b3c69444275f994c0fe690c63b8df8/analysis/1513498581/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d662-6578-4229-9ef4-408c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d662-02c4-4e58-b5d5-418002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-17 08:16:21", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d662-3a50-432c-84e5-416502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bbeb2a80-fffe-4959-a634-6d1b92c27966", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:18.000Z", "modified": "2018-03-13T13:47:18.000Z", "pattern": "[file:hashes.MD5 = 'a13884ea719f3f48d7487b8fa2ca7fa9' AND file:hashes.SHA1 = 'dce99aaf64c4aae484232fdd2a58136d797b2ed6' AND file:hashes.SHA256 = '50625750d4338ad1698b2216d0b289cee2666ac5ea081b90b11859ee13c92a78']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--68c69bf0-47b9-4ea2-8531-239821114309", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:16.000Z", "modified": "2018-03-13T13:47:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/50625750d4338ad1698b2216d0b289cee2666ac5ea081b90b11859ee13c92a78/analysis/1520438541/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d664-ca8c-400f-b284-4c4c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d665-da58-4f9f-a706-404902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:02:21", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d665-76cc-41b6-bc01-49e202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fe568963-2dc3-417b-99e1-5ad9a83f40db", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:20.000Z", "modified": "2018-03-13T13:47:20.000Z", "pattern": "[file:hashes.MD5 = '2da6caeb7945a29deb4d1b4d2a71d168' AND file:hashes.SHA1 = '662a6ebeec07415749c907a24ae953c67e691eed' AND file:hashes.SHA256 = '6f3ad7b311f7f052accecf3a434418e499d3f2e7cd6374c15d8d26a3f1785c01']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--df245559-1f77-4c8e-b92a-873b30f1c2d5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:18.000Z", "modified": "2018-03-13T13:47:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/6f3ad7b311f7f052accecf3a434418e499d3f2e7cd6374c15d8d26a3f1785c01/analysis/1520439081/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d667-f00c-4b16-b763-4b3802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d667-0a78-4bad-9cc4-485502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:11:21", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d667-b0e4-4d0f-a195-49bc02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--18dd827f-22e9-4c33-b517-6cbcddc95a21", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:22.000Z", "modified": "2018-03-13T13:47:22.000Z", "pattern": "[file:hashes.MD5 = 'f143d252ab3c1ee86aee33f3e1eb2f8b' AND file:hashes.SHA1 = '20cb638150ee953c13a391cbb6f1f0045b82b651' AND file:hashes.SHA256 = 'f323778fbfaca654f6b91124c60d81bc3fba360ff96d30f0253293760ae504a0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e6a3fa3d-87e2-45e3-af5d-d6991ae8e074", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:21.000Z", "modified": "2018-03-13T13:47:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f323778fbfaca654f6b91124c60d81bc3fba360ff96d30f0253293760ae504a0/analysis/1520441317/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d669-722c-43be-9829-4f2402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d669-cbdc-48ac-99bc-42a802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:48:37", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d669-45f8-4b9e-a58f-4fad02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bd8efd15-6af3-43ba-84c8-eac4769883cf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:25.000Z", "modified": "2018-03-13T13:47:25.000Z", "pattern": "[file:hashes.MD5 = '2c7c44b6f5df8af5cf44ef88f9f1bad1' AND file:hashes.SHA1 = '3efb441e727c21a5bf45f3650a32aadee42bdfba' AND file:hashes.SHA256 = '041ad28cf8a6c03953910ea6dec3987ffd4daf729cce2a87e9bf68c480c0918e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--618d429f-6a91-4bba-892a-c719cf60cea3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:23.000Z", "modified": "2018-03-13T13:47:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/041ad28cf8a6c03953910ea6dec3987ffd4daf729cce2a87e9bf68c480c0918e/analysis/1516822177/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d66b-a678-4f0d-934b-44bc02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d66c-9414-4eb6-8015-474802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-24 19:29:37", "category": "Other", "comment": "Executable File", "uuid": "5aa7d66c-4910-438e-9dba-4df402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--277f3ee6-3d34-4038-abcf-2499c69b02ce", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:27.000Z", "modified": "2018-03-13T13:47:27.000Z", "pattern": "[file:hashes.MD5 = '94d2add64b1e07760e8e4d19f5990a6d' AND file:hashes.SHA1 = '2304d54247853d33128b1606929b55c2e178b947' AND file:hashes.SHA256 = '90d3cad13e03fa3a586c84deacd68bf6ae37f60ea030d1efaea5fbacc1a1e93f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f4efd30c-0621-4634-a2ec-478ab941efca", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:26.000Z", "modified": "2018-03-13T13:47:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/90d3cad13e03fa3a586c84deacd68bf6ae37f60ea030d1efaea5fbacc1a1e93f/analysis/1520908980/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d66e-075c-4f1e-b7d7-463102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/57", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d66e-00b8-4aae-9fff-48bc02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 02:43:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d66e-1e00-4d1c-a6d3-464b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9478791d-a2ed-4bbe-866c-f36e552defdd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:29.000Z", "modified": "2018-03-13T13:47:29.000Z", "pattern": "[file:hashes.MD5 = '0b841d3ea970f05ddf1009711d82572d' AND file:hashes.SHA1 = '0317909ce88167641bda95d27d7890afe346d0ab' AND file:hashes.SHA256 = 'dc8c82e7dd88d9d42f2872fee149eb219b537c2f21035834bed17cd205f54a51']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--837f0b81-3cbb-419b-82d8-2bb5de26578c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:28.000Z", "modified": "2018-03-13T13:47:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/dc8c82e7dd88d9d42f2872fee149eb219b537c2f21035834bed17cd205f54a51/analysis/1510365441/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d670-3134-4dc8-a465-40de02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/56", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d670-0bb0-4c02-ae7a-465502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-11 01:57:21", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d670-b25c-4fb1-8eee-46dc02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--25ac76f6-4ab3-4d15-a4e4-4c5536e0520d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:32.000Z", "modified": "2018-03-13T13:47:32.000Z", "pattern": "[file:hashes.MD5 = '046c3f9b6ef9e9ea743428f2da359966' AND file:hashes.SHA1 = 'a2c531dd0692088e1afdf22b9624335f2e72b930' AND file:hashes.SHA256 = 'b41c8eb7d5907d0a13d03163cbb4114a2983c4dc00237aab00f1a632725c27a6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b8393ac2-5026-481f-82f1-db6fb4b48d28", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:30.000Z", "modified": "2018-03-13T13:47:30.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b41c8eb7d5907d0a13d03163cbb4114a2983c4dc00237aab00f1a632725c27a6/analysis/1520440604/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d672-31c4-49bc-9488-43c402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d673-2f40-474e-8a67-4bcb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:36:44", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d673-5ad8-4aa6-867a-488002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1270a24c-137d-42b8-8bb2-f327d09c62d1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:34.000Z", "modified": "2018-03-13T13:47:34.000Z", "pattern": "[file:hashes.MD5 = 'fc6e4c79d4212b5973d6a521beee65da' AND file:hashes.SHA1 = '1a80af199e8ff655881efd641fd428372eca8ad2' AND file:hashes.SHA256 = '93107f3a350dc955a632a5011f7cb274b0ca9288c2106bf6c971bbb09c0ececc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0bef6eee-e08f-4405-9ffa-7b98518e0fae", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:32.000Z", "modified": "2018-03-13T13:47:32.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/93107f3a350dc955a632a5011f7cb274b0ca9288c2106bf6c971bbb09c0ececc/analysis/1520488534/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d674-8400-4dcc-aa47-4f7502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d675-ede8-4d66-b706-412002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:55:34", "category": "Other", "comment": "Executable File", "uuid": "5aa7d675-0ed0-4f4b-bebc-428c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--44a433bd-8cfe-4150-ac8d-16ca5a4982fd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:36.000Z", "modified": "2018-03-13T13:47:36.000Z", "pattern": "[file:hashes.MD5 = '823dbbac6c62eb692b12729ef54d1616' AND file:hashes.SHA1 = 'fb1ea59255acc89d188ea93af3e5cb12d666772e' AND file:hashes.SHA256 = '8205524c6b5b6a395c44585fb04e835fbcdff2b0a135b210dbb281a33feb39dd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5bfacbe9-088e-452b-864b-e4e0071f5dd3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:35.000Z", "modified": "2018-03-13T13:47:35.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8205524c6b5b6a395c44585fb04e835fbcdff2b0a135b210dbb281a33feb39dd/analysis/1520488516/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d677-6708-4574-b863-483802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d677-6994-4509-a990-4b0002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:55:16", "category": "Other", "comment": "Executable File", "uuid": "5aa7d677-6328-4d6e-82fa-4f0502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b80818b7-46c2-41f2-8274-9bd66c2441b3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:39.000Z", "modified": "2018-03-13T13:47:39.000Z", "pattern": "[file:hashes.MD5 = '35946f8fbace68696f1492f8a21db359' AND file:hashes.SHA1 = '2b02e8c314f86ec85031af3266b1c05dcbe4682a' AND file:hashes.SHA256 = '6667897650cba6e393345151f9b44e62bb5d1eb97888e4fb569d79d7fe89b873']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b55faed7-7aa6-460d-885e-2c47abff9462", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:37.000Z", "modified": "2018-03-13T13:47:37.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/6667897650cba6e393345151f9b44e62bb5d1eb97888e4fb569d79d7fe89b873/analysis/1520913595/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d679-39e4-43a6-90d4-460902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d679-5f20-421c-9b8c-458d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:59:55", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d679-c674-4929-8e65-4eb402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b1f1d953-5872-4004-bd05-9fa658e326fe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:41.000Z", "modified": "2018-03-13T13:47:41.000Z", "pattern": "[file:hashes.MD5 = '7ea4bef65f98165b6d04252025b0c9a5' AND file:hashes.SHA1 = '11757e130582f7b9ed748f5f870264efa2af618c' AND file:hashes.SHA256 = '9248bf0411d30d4f1616f3a2d7a055b4692c87717033a36ab630ba20ff599489']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--dd23efa6-454b-4338-82cd-ff495fb2b32c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:39.000Z", "modified": "2018-03-13T13:47:39.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9248bf0411d30d4f1616f3a2d7a055b4692c87717033a36ab630ba20ff599489/analysis/1520841218/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d67b-20f8-412d-b676-458602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d67c-54f0-45f5-a1cf-420302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 07:53:38", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d67c-0c70-4a3e-9a8f-4aa702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a20fd02a-a3bb-45a2-9cdd-537570f9d775", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:43.000Z", "modified": "2018-03-13T13:47:43.000Z", "pattern": "[file:hashes.MD5 = '0d6098544b53298c86b99ce5890bb398' AND file:hashes.SHA1 = '5b90a1b7b095bc7343079fd7fece1ad80a668efa' AND file:hashes.SHA256 = 'd69a55c55cf4c831579defdc8ae640997141c577558adc07fe53d037008541e3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9dc0eda8-c956-43e1-8bc4-5c88a5da9d9e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:41.000Z", "modified": "2018-03-13T13:47:41.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d69a55c55cf4c831579defdc8ae640997141c577558adc07fe53d037008541e3/analysis/1520376482/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d67e-fd10-418f-934f-403302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d67e-921c-4c9d-8f15-465d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:02", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d67e-22e4-4001-9c8d-43c802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2e2cb479-1811-4020-91b1-64206c1c3bf9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:45.000Z", "modified": "2018-03-13T13:47:45.000Z", "pattern": "[file:hashes.MD5 = '529248046e18baff274f2f4b2af5511a' AND file:hashes.SHA1 = '5cb98c290f82074db0dea23181fda62d95c333f0' AND file:hashes.SHA256 = '0e3de5470c2f6687efee85eeb7022cd304b880118fdfc23eee8761ce3374635a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a681ce5c-c6b9-4dfa-86df-b14f736d5727", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:44.000Z", "modified": "2018-03-13T13:47:44.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0e3de5470c2f6687efee85eeb7022cd304b880118fdfc23eee8761ce3374635a/analysis/1520851260/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d680-0e8c-4566-9606-4af502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d680-a380-4f8e-a07e-439102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 10:41:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d680-d408-481c-86f7-4b5c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ca040b60-0f2e-42d9-9503-73c4fe312591", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:48.000Z", "modified": "2018-03-13T13:47:48.000Z", "pattern": "[file:hashes.MD5 = '82fb310217a19b5a18a8a89a7a71fcec' AND file:hashes.SHA1 = 'db12e4e79808e0089f78b27c2a8e66462fefed45' AND file:hashes.SHA256 = '7cbcb52a2d8de4b64ccc9b885e43e39823de8c327705abe45b8bcab2b17d548e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4c3be041-e873-416f-a301-ac3f2e8ba8cd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:46.000Z", "modified": "2018-03-13T13:47:46.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7cbcb52a2d8de4b64ccc9b885e43e39823de8c327705abe45b8bcab2b17d548e/analysis/1520439426/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d682-77c0-4692-9261-4b8e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d683-14ac-4ade-b706-4c8d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:17:06", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d683-6b50-49fa-8abd-466402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--41cff4ef-ba06-42ac-a0a6-01e30418969e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:50.000Z", "modified": "2018-03-13T13:47:50.000Z", "pattern": "[file:hashes.MD5 = '359745eae11ef65e0bf88700ea5b94aa' AND file:hashes.SHA1 = '63046f4fdbbd5dac4f06e146fbfcbe87ea0c464c' AND file:hashes.SHA256 = 'cdd034e8c27dcaf9baad53fa038b5931f2aeb4f313980fd99b5eb7d615df3458']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5f59b1cf-7051-497b-85ae-26bb254d7664", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:48.000Z", "modified": "2018-03-13T13:47:48.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cdd034e8c27dcaf9baad53fa038b5931f2aeb4f313980fd99b5eb7d615df3458/analysis/1520376477/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d684-9e70-4e73-beae-4e8102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d685-055c-4c2e-87b6-4ddd02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:57", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d685-b19c-40c8-a439-462a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1f9b7984-58b4-4bdd-9b7e-c2782de29504", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:52.000Z", "modified": "2018-03-13T13:47:52.000Z", "pattern": "[file:hashes.MD5 = '88aeb1bf08ade97d24ea8e379cb923a8' AND file:hashes.SHA1 = 'b189ea64e1a3054a1b2e617624e06649e912d42e' AND file:hashes.SHA256 = 'ffd17e07e3b64207128b0b10f7b638c8bc97022f07b4410e7de28ad07650db09']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9c900612-9431-4577-8580-6099cfb0e4d4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:50.000Z", "modified": "2018-03-13T13:47:50.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ffd17e07e3b64207128b0b10f7b638c8bc97022f07b4410e7de28ad07650db09/analysis/1520441608/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d687-6fe4-40e8-a37c-4beb02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d687-0a8c-4850-a8c9-47b502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:53:28", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d687-f940-4f74-a60d-472c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a731aeaa-5c51-454a-8690-3c7622717b8c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:54.000Z", "modified": "2018-03-13T13:47:54.000Z", "pattern": "[file:hashes.MD5 = '8d5449a992c4e07254ff830a3bbf2c6f' AND file:hashes.SHA1 = 'e2a90158d33b61a828c8199a1eb0c9124119d49c' AND file:hashes.SHA256 = '7ec64290f1e946d9d0c20a03d9319f92e401ced19e0efe0d8770db75cad67278']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--dbba2e99-1c39-493e-b7f1-5e50c4b677dd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:53.000Z", "modified": "2018-03-13T13:47:53.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7ec64290f1e946d9d0c20a03d9319f92e401ced19e0efe0d8770db75cad67278/analysis/1520913597/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d689-1780-4533-b227-486d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d689-0b0c-4367-9e13-4d5e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:59:57", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d689-1c9c-4308-a21d-44e302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--17f52d1f-c8ce-45c8-996b-38d624db86c9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:57.000Z", "modified": "2018-03-13T13:47:57.000Z", "pattern": "[file:hashes.MD5 = '34de72c486440b5f26163b7cae6a356c' AND file:hashes.SHA1 = '9744f2b436b0cb6c3254d7f5e83661415c227bd9' AND file:hashes.SHA256 = '9cdd5a451b12b913bc48ae99877f3f3ae830e94fdc7a93bc919c8b31eb2dd8de']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f48c3488-0954-4be2-972d-05c233558f73", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:55.000Z", "modified": "2018-03-13T13:47:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9cdd5a451b12b913bc48ae99877f3f3ae830e94fdc7a93bc919c8b31eb2dd8de/analysis/1511747984/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d68b-f07c-49c5-aa5a-4d6502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "53/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d68c-4110-464e-9f17-499002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-27 01:59:44", "category": "Other", "comment": "Executable File", "uuid": "5aa7d68c-5d64-4fde-9bcc-492502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ca0e53e1-d879-426b-9b6f-a60fc942957a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:59.000Z", "modified": "2018-03-13T13:47:59.000Z", "pattern": "[file:hashes.MD5 = '50306a1e946ec6fee6ca45d75b612468' AND file:hashes.SHA1 = '626263cd9b2c53e67e8eef9723055477091f3305' AND file:hashes.SHA256 = '5e669d80d7dde5dad3b86547f4b9a89dde17a39470a929d829e84a90442d986d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:47:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--85d876f7-0257-4977-9817-d92fe656f507", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:47:57.000Z", "modified": "2018-03-13T13:47:57.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5e669d80d7dde5dad3b86547f4b9a89dde17a39470a929d829e84a90442d986d/analysis/1520438807/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d68e-7f30-41f8-97ec-4d9e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d68e-d438-4bf7-9bd8-49aa02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:06:47", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d68e-b838-44c7-9508-40e402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c95b1e9d-e2de-413e-9ffb-4b87f049250b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:01.000Z", "modified": "2018-03-13T13:48:01.000Z", "pattern": "[file:hashes.MD5 = 'b418120f5a7b2acdad58c9c129293730' AND file:hashes.SHA1 = 'eab17c2d6eb186a6c1a7d161ff1424a88f6f319d' AND file:hashes.SHA256 = '258989c785d7b5d50cd4a9a5c2fc6b27ad84912c80c079c896db23bb64ac9772']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--83fe5578-3bef-44db-a66d-be68a3cbc329", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:00.000Z", "modified": "2018-03-13T13:48:00.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/258989c785d7b5d50cd4a9a5c2fc6b27ad84912c80c079c896db23bb64ac9772/analysis/1519923991/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d690-d9c0-499f-b4a9-4a4d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "26/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d690-7bbc-4f7b-a99a-467302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-01 17:06:31", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d690-a060-4a53-a7c0-497c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--06e88af6-9100-4e50-aed7-494831bf2a2a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:04.000Z", "modified": "2018-03-13T13:48:04.000Z", "pattern": "[file:hashes.MD5 = '086990f9248b55b908439368bbf9c29c' AND file:hashes.SHA1 = '0dbbcde57ebaaa8607806280177cefdfe88cdc6f' AND file:hashes.SHA256 = '37ae9bf28a5761205b13fcd0c1d5790ee2f6685acbcbbbc18eaffd08f1879494']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e24a4551-324f-44dc-a13f-3fea25676610", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:02.000Z", "modified": "2018-03-13T13:48:02.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/37ae9bf28a5761205b13fcd0c1d5790ee2f6685acbcbbbc18eaffd08f1879494/analysis/1520376431/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d692-c964-495c-b06a-4a9302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d692-5368-425b-9755-491102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:11", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d692-f920-4d81-b6ad-44fd02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--59eda1ba-179f-4293-bd44-50871517d08a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:06.000Z", "modified": "2018-03-13T13:48:06.000Z", "pattern": "[file:hashes.MD5 = '151c2c242a9ee4e72a0731df6f56c921' AND file:hashes.SHA1 = 'dc98c1d9f891b5292cc4e8d8d8d63702d516f996' AND file:hashes.SHA256 = 'eeb435abd819f5ec850aba835f52125beba9d45e3d86ac0000eafc27f9844dc8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d834c18d-a902-4c28-857c-4a0da7c92148", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:04.000Z", "modified": "2018-03-13T13:48:04.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/eeb435abd819f5ec850aba835f52125beba9d45e3d86ac0000eafc27f9844dc8/analysis/1506476436/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d694-9f04-452d-a00b-413002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d695-8e18-4da5-9a17-441002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-09-27 01:40:36", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d695-6948-4368-800f-46d602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a2c02004-e597-42d9-8a99-a8e678e68dfd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:08.000Z", "modified": "2018-03-13T13:48:08.000Z", "pattern": "[file:hashes.MD5 = '19df8ec2dce7fad0ed46f1e63d2adf92' AND file:hashes.SHA1 = '06956e6b691053e8ca1a62d0def55ffb7d63fd4a' AND file:hashes.SHA256 = '8d3b61d3137f802673644ecb3f673128df1afea1b96926283bb007b7dd681602']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d575295b-27a7-4e8d-ae64-606955c6bcc7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:07.000Z", "modified": "2018-03-13T13:48:07.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8d3b61d3137f802673644ecb3f673128df1afea1b96926283bb007b7dd681602/analysis/1520439798/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d697-e7b4-41fa-a1f1-4a7702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d697-1e18-4725-b5ce-47eb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:23:18", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d697-f4d8-454e-b43a-489202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--becac4fa-8cc6-4b3b-823f-cb2f413a18c8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:11.000Z", "modified": "2018-03-13T13:48:11.000Z", "pattern": "[file:hashes.MD5 = 'c5d7d43efa69bc3ec1c5ba00ee499b32' AND file:hashes.SHA1 = '4f35798e4e9896c7e2d1fc6d0ab941d7f2d1b4fd' AND file:hashes.SHA256 = '33a5975e9efb51377b2b5fec1b4313e87d4cef1a7858390e64ddcfc28e1267c7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--34023aca-655f-4916-b588-65ed3f78c8cc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:09.000Z", "modified": "2018-03-13T13:48:09.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/33a5975e9efb51377b2b5fec1b4313e87d4cef1a7858390e64ddcfc28e1267c7/analysis/1520438004/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d699-072c-4c80-891d-429e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d69a-5c5c-4ae3-b16c-43b402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:53:24", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d69a-babc-4780-a915-44f202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--df145429-2ca1-436f-b388-10fa744f43db", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:13.000Z", "modified": "2018-03-13T13:48:13.000Z", "pattern": "[file:hashes.MD5 = '00a7b96790c3ca21f7e5bdcdfe7a15e7' AND file:hashes.SHA1 = '33b861b31419dbc6b21d2fa4444a8a78b988ea13' AND file:hashes.SHA256 = 'f82333a95a38167b554da0a6d2da54b19a0c633e6d8aa3a3a47c98a3fee304ab']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6c998244-f800-48ff-98d8-3f232c8f21c8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:11.000Z", "modified": "2018-03-13T13:48:11.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f82333a95a38167b554da0a6d2da54b19a0c633e6d8aa3a3a47c98a3fee304ab/analysis/1520441422/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d69b-300c-4140-977d-409502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d69c-4b20-46e2-9a1e-4ae002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:50:22", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d69c-bc78-4c67-b6f2-462202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--78f1fadb-c0cb-4ea2-8aec-0c43d2f960e0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:15.000Z", "modified": "2018-03-13T13:48:15.000Z", "pattern": "[file:hashes.MD5 = 'bf6e116ded5ec532d467a96f368bf4a4' AND file:hashes.SHA1 = '9cd7cdd38e5405e61353e4fa095c9b718f3ee515' AND file:hashes.SHA256 = '56bfcdd6d4fa3414ddeaefedbae3d5c1914f2d183c69ffff70929dfee80a0d8e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a0a0caae-59b2-41c5-b073-243c37515fba", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:14.000Z", "modified": "2018-03-13T13:48:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/56bfcdd6d4fa3414ddeaefedbae3d5c1914f2d183c69ffff70929dfee80a0d8e/analysis/1520376518/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d69e-5b38-4633-9d20-486c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d69e-5548-4132-9b1a-4cab02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:38", "category": "Other", "comment": "Executable File", "uuid": "5aa7d69e-9314-40c8-a3c5-409e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b1adda64-9a8b-4634-8e63-327e75d42eb8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:17.000Z", "modified": "2018-03-13T13:48:17.000Z", "pattern": "[file:hashes.MD5 = '07bb7384fc75df9e7287736aae4049c7' AND file:hashes.SHA1 = 'e2ba239cf29bd9713e59797b2de06c3c04c9ac9b' AND file:hashes.SHA256 = 'bd7138482a831b4a81150dda541b2375a10796dd365e5af441caabeea42bf455']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f7b56700-8e0d-4fb3-9a59-08cef7c60a30", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:16.000Z", "modified": "2018-03-13T13:48:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/bd7138482a831b4a81150dda541b2375a10796dd365e5af441caabeea42bf455/analysis/1520488314/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6a0-d654-44c8-aec8-4e0502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6a0-6378-40f2-bfe9-40a002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:51:54", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6a0-1ecc-4760-863e-4f1202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ee11a006-60cb-4c20-b2db-27b8408162d1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:20.000Z", "modified": "2018-03-13T13:48:20.000Z", "pattern": "[file:hashes.MD5 = 'd42075d95856d2edc5c377718039ed39' AND file:hashes.SHA1 = 'ccbd0ce294b04aaf467ea924ebc785ce92640907' AND file:hashes.SHA256 = '19699d486840e392aa9b9630ab5df16233cca09230d7da30b60bb60cf973150c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--61bc1c8c-cd0e-4f35-87ef-c686650b7622", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:18.000Z", "modified": "2018-03-13T13:48:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/19699d486840e392aa9b9630ab5df16233cca09230d7da30b60bb60cf973150c/analysis/1515154532/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6a2-6088-40f0-a91f-4be902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6a3-6700-4554-95a5-444902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-05 12:15:32", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6a3-1a50-4698-8a72-40f902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--44b91ea0-d5c5-45b2-b85a-cf3d37d53086", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:22.000Z", "modified": "2018-03-13T13:48:22.000Z", "pattern": "[file:hashes.MD5 = '2ba93bc284cb2136f4b882a9548246f9' AND file:hashes.SHA1 = '7ca7f650909160cc90a5261fa660a25160c1f217' AND file:hashes.SHA256 = '77482b48f56ef3a4132b52fb70432634b58ec165191fbcfbf9a0cbfbd1bccad5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--483cd876-ce01-40a6-a4d2-0f11987cd0da", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:20.000Z", "modified": "2018-03-13T13:48:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/77482b48f56ef3a4132b52fb70432634b58ec165191fbcfbf9a0cbfbd1bccad5/analysis/1520488504/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6a5-794c-401b-b414-4fd402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6a5-79c4-4119-bb42-430202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:55:04", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6a5-1a70-42db-9093-4a5602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6b50419e-57d0-43b7-bc75-8c92995bea47", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:24.000Z", "modified": "2018-03-13T13:48:24.000Z", "pattern": "[file:hashes.MD5 = '1243c541bf07404279c1a42e4ec5c211' AND file:hashes.SHA1 = '7a56a988ccafcfa3ac34ef5d898381d274c31cf5' AND file:hashes.SHA256 = 'a78cde697ef1aa54eb3ad74dcc0f1a40b5aec3ef936e213e7fd38480e07e919c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8a1d430b-966e-4e9e-86f5-fcf619c3dc87", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:23.000Z", "modified": "2018-03-13T13:48:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a78cde697ef1aa54eb3ad74dcc0f1a40b5aec3ef936e213e7fd38480e07e919c/analysis/1495623955/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6a7-9e58-4ea2-a99e-4eb602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/61", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6a7-47ac-4074-a234-445d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-05-24 11:05:55", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6a7-bbe8-439c-bfeb-460902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--78c3f029-acfc-4d24-94f2-18058e811bd6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:27.000Z", "modified": "2018-03-13T13:48:27.000Z", "pattern": "[file:hashes.MD5 = 'ea592197a398714700eec0b1b4ee8e33' AND file:hashes.SHA1 = '85c1052f392c6f39c368dcf5d5cc39890cbdabf2' AND file:hashes.SHA256 = 'a85ec8d623a497bd37efe216f8bd9e88ad24050949aacaf66461165ba09d5861']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--73af1f83-a272-4099-b219-b05e77c7d7e1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:25.000Z", "modified": "2018-03-13T13:48:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a85ec8d623a497bd37efe216f8bd9e88ad24050949aacaf66461165ba09d5861/analysis/1518777123/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6a9-ef40-4078-a28d-420802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6a9-2ecc-46d2-bf78-4c6e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-16 10:32:03", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6a9-6600-4509-ac14-48b302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e2f6f53c-1b21-4f9b-ba9c-da35fc181c97", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:29.000Z", "modified": "2018-03-13T13:48:29.000Z", "pattern": "[file:hashes.MD5 = 'abb3999414e91387ca12fb46aeb02e4b' AND file:hashes.SHA1 = 'a1d7cb0dc453f23c5e82f64c23344fe92dda0df9' AND file:hashes.SHA256 = '23b4a46ddb5f904cd8c0a8b8eebfc623380a587a53c79469fd24b1724401fa0f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e19b532c-dd5a-4278-ae1c-372d66b8b146", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:27.000Z", "modified": "2018-03-13T13:48:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/23b4a46ddb5f904cd8c0a8b8eebfc623380a587a53c79469fd24b1724401fa0f/analysis/1520488415/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6ab-f134-466c-bfa9-45c202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6ac-9c34-46e3-8d6e-4cc302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:53:35", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6ac-9798-4514-a443-45f002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7737ccff-f82f-494b-90cc-1b22e2c2b6b5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:31.000Z", "modified": "2018-03-13T13:48:31.000Z", "pattern": "[file:hashes.MD5 = '1f3383fec72b09050d5433266233ba0c' AND file:hashes.SHA1 = '1b196a21b3146d6711528c27c4be0fc2bdf947b1' AND file:hashes.SHA256 = '91f122e42535165233ef5657279eadcc15bd90e723a13fb1b51ab9096b6e582d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0d6879bc-8075-4bf5-9a98-f06c6991f1ac", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:30.000Z", "modified": "2018-03-13T13:48:30.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/91f122e42535165233ef5657279eadcc15bd90e723a13fb1b51ab9096b6e582d/analysis/1515015363/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6ae-24b4-4dde-8828-468f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6ae-c8b8-4e84-9870-43e502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 21:36:03", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6ae-a704-48f9-ad62-4d9402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--08609b6c-4c68-4ab4-8a22-8ce67ae5dd55", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:34.000Z", "modified": "2018-03-13T13:48:34.000Z", "pattern": "[file:hashes.MD5 = '920dcb7686f127752b2064187610ef5b' AND file:hashes.SHA1 = 'e5f4ec2a392c60eb4c9ba38310f81237809e67df' AND file:hashes.SHA256 = 'e8dcdb7f6d3108ba1ad0800ba6167f7456e4a1b2c95038ecd7960989402f54ca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1f4d6780-90cb-4281-95a5-6524ce6145d8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:32.000Z", "modified": "2018-03-13T13:48:32.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e8dcdb7f6d3108ba1ad0800ba6167f7456e4a1b2c95038ecd7960989402f54ca/analysis/1520376545/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6b0-4230-4618-b98d-41d002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "42/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6b1-9298-4f21-b71e-4e5602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:49:05", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6b1-7c74-4a41-a855-4a6302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2b485a76-ed4a-4832-8601-93576827def2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:36.000Z", "modified": "2018-03-13T13:48:36.000Z", "pattern": "[file:hashes.MD5 = '85221e7c9ea46e46d1fb8b714b1c3cec' AND file:hashes.SHA1 = 'f2a5151f935f7378f6118aa406f9d7da9098f2b9' AND file:hashes.SHA256 = '309d3a5549fe176866c18d11bbf03899cece1b666e9b28358daf9aba3efd2068']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bfe8c8f1-123f-4fbe-9a57-ca43bda77bbb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:34.000Z", "modified": "2018-03-13T13:48:34.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/309d3a5549fe176866c18d11bbf03899cece1b666e9b28358daf9aba3efd2068/analysis/1520437899/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6b2-753c-4ea0-8d4f-46cf02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6b3-89e8-4512-be02-4d4502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:51:39", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6b3-91a4-4b3e-a0f3-43b202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ccb0100a-cc61-45c9-a42e-946b0b9a2bbe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:38.000Z", "modified": "2018-03-13T13:48:38.000Z", "pattern": "[file:hashes.MD5 = '214cf04320b749b795c189cf7cd2d804' AND file:hashes.SHA1 = '462dcfe908d67f60c19d4a5b94653ab87b2078ef' AND file:hashes.SHA256 = '9371809d87c41170ba8bfab3241f5b31d664035c9a249ba6541ff9cd57cb374e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3d1d4143-fd00-4946-b5c3-227bf730b271", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:38.000Z", "modified": "2018-03-13T13:48:38.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9371809d87c41170ba8bfab3241f5b31d664035c9a249ba6541ff9cd57cb374e/analysis/1520440045/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6b8-93dc-4247-bea2-44c602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6b8-a280-4985-85f4-4d3102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:27:25", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6b8-2a10-4810-af93-402002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d28c925e-1dc6-4915-8cc1-31b30c1d3d77", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:43.000Z", "modified": "2018-03-13T13:48:43.000Z", "pattern": "[file:hashes.MD5 = 'cf6c098d4eff4facdc4212f5c1ccba05' AND file:hashes.SHA1 = '78f9eb44e86d5e48dc2211ded1c43083fd908bc7' AND file:hashes.SHA256 = 'ecfeced9d622807d2b82b64fc2ba725603f9116f41e1ddb58715e1f751bbebb9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7295e73f-9200-4da9-9cee-1235ab0ef8c0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:42.000Z", "modified": "2018-03-13T13:48:42.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ecfeced9d622807d2b82b64fc2ba725603f9116f41e1ddb58715e1f751bbebb9/analysis/1520913241/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6ba-aabc-4cff-bce6-45f702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6ba-cb4c-4141-a8c7-4de502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:54:01", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6ba-f568-4e35-a7ed-4bc702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--031272c7-aeea-4886-bc0e-c82c2399ced1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:46.000Z", "modified": "2018-03-13T13:48:46.000Z", "pattern": "[file:hashes.MD5 = 'ed04402ceb7302ecb8a3455a2c6315c1' AND file:hashes.SHA1 = 'a87e3e8b7a9d0867639a50401cf0f702305ef196' AND file:hashes.SHA256 = '88ad17307f86b59c35f1c424cf785343ae93a58979ecbb063e6f44603675b918']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6279338c-1317-49e5-9fa3-61d39d1fd85e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:44.000Z", "modified": "2018-03-13T13:48:44.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/88ad17307f86b59c35f1c424cf785343ae93a58979ecbb063e6f44603675b918/analysis/1520439693/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6bc-a9c0-4c58-b5ed-401602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6bc-501c-4edc-8600-4f5402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:21:33", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6bc-7198-499b-9b70-403302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dd1b94ca-12df-4746-81b9-0f2762545592", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:48.000Z", "modified": "2018-03-13T13:48:48.000Z", "pattern": "[file:hashes.MD5 = 'b505ce921aa64ab406410695a9f766e8' AND file:hashes.SHA1 = '69ecdc76bc4932d01410aece2f09f2d67b721db1' AND file:hashes.SHA256 = 'a3e2b07d7094473e7bcfedaf4e1df411f8c4e5113658332dfe1ca32f621ab33d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--345cb4a5-817c-402e-8306-11ac04b71d83", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:46.000Z", "modified": "2018-03-13T13:48:46.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a3e2b07d7094473e7bcfedaf4e1df411f8c4e5113658332dfe1ca32f621ab33d/analysis/1519015662/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6be-f5bc-42c7-8ef4-479e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6bf-d8dc-4801-9296-4e7702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-19 04:47:42", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6bf-546c-4a6e-bdc7-4c1302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2ac12e74-5306-4785-82c0-7ba96983994a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:50.000Z", "modified": "2018-03-13T13:48:50.000Z", "pattern": "[file:hashes.MD5 = '94554309cd1b23a0655017d0a01ae100' AND file:hashes.SHA1 = 'c5a4e5cd885b8cae07e1ecd9e633d208480eac5a' AND file:hashes.SHA256 = '0871d285f67c78a38e6713aeb7b1d76f8777d1d3a5479ed81e543ebcca54a1fe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b55def3e-7c02-45e4-8e38-55ae68cfc362", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:48.000Z", "modified": "2018-03-13T13:48:48.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0871d285f67c78a38e6713aeb7b1d76f8777d1d3a5479ed81e543ebcca54a1fe/analysis/1520488410/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6c0-57d8-47bd-b13e-4fe402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6c1-584c-47c5-b5eb-425b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:53:30", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6c1-3f88-4036-83f3-442302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b5b1d0ad-ca31-4465-b922-bc5cdda1fe8e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:52.000Z", "modified": "2018-03-13T13:48:52.000Z", "pattern": "[file:hashes.MD5 = '5859e84404958b588ff1cd609da002ef' AND file:hashes.SHA1 = '5c59e4466b26bfd4fd3615ae0bc670c8d2eef35c' AND file:hashes.SHA256 = 'f8bdb65d54ccab04a506e84f14bdbeef15f6266a7bd6e4e7dfde69de424dd10a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bcd5c109-6f56-4f18-b58c-0866365f87b1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:50.000Z", "modified": "2018-03-13T13:48:50.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f8bdb65d54ccab04a506e84f14bdbeef15f6266a7bd6e4e7dfde69de424dd10a/analysis/1520275555/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6c3-e944-4ea1-acb8-413b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6c3-4c08-4c9b-a2ba-480c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-05 18:45:55", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6c3-962c-4339-8ace-4f2602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3f19950c-9a19-4b31-8f00-1af92d3a1bc0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:54.000Z", "modified": "2018-03-13T13:48:54.000Z", "pattern": "[file:hashes.MD5 = '055b9accac2fdec9508b4f1edadb4849' AND file:hashes.SHA1 = 'fb9258172e84a2474203e50b863ec561156f3aa4' AND file:hashes.SHA256 = '50de5d472ca4336f21c1c54eddfac7da2dcb2b0062cb82bc23232af51488f48c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1d20673f-8d52-47c7-9740-2ba5d4dfcb48", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:53.000Z", "modified": "2018-03-13T13:48:53.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/50de5d472ca4336f21c1c54eddfac7da2dcb2b0062cb82bc23232af51488f48c/analysis/1517539310/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6c5-913c-4e45-a97b-420502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "40/64", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6c5-d710-4a25-8642-436102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-02 02:41:50", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6c5-43ac-49f6-89fc-46ad02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4998219b-3f2a-4415-9120-aec6680e1e44", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:57.000Z", "modified": "2018-03-13T13:48:57.000Z", "pattern": "[file:hashes.MD5 = '284586a84c24b5d37f6744372c666583' AND file:hashes.SHA1 = '60133923e201f7a94165d76a4b9ef4989355eeb8' AND file:hashes.SHA256 = 'ab0ca8231c11d7f0aa9ac32e270b86eece17946a8fc12220788f9bec35b9f584']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--80e03ba7-89f4-44f2-a0e4-6392a20743b2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:55.000Z", "modified": "2018-03-13T13:48:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ab0ca8231c11d7f0aa9ac32e270b86eece17946a8fc12220788f9bec35b9f584/analysis/1520440362/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6c7-7344-476f-85d5-47ab02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6c7-a3bc-45fe-8a46-4dec02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:32:42", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6c7-2574-4bc1-8ce1-4e9902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bfdac829-84e7-422b-98b4-6c2668aa0587", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:59.000Z", "modified": "2018-03-13T13:48:59.000Z", "pattern": "[file:hashes.MD5 = '248f0ea99838dcc62104aafeee02f0be' AND file:hashes.SHA1 = '96ea1a29786c0466c1b1765cb80bdc8f28a9117a' AND file:hashes.SHA256 = 'e854dbc8dfe31447083411d4f597de00e4addfe265a3c3103d8d3a5961ec82f0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:48:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--af568763-fed7-4558-9441-26b2cc6362b9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:48:57.000Z", "modified": "2018-03-13T13:48:57.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e854dbc8dfe31447083411d4f597de00e4addfe265a3c3103d8d3a5961ec82f0/analysis/1520406564/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6c9-327c-48f9-9e1e-459302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6c9-1690-47e8-be55-466902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 07:09:24", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6c9-7ee0-4061-b3a3-40da02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--86bad043-2708-431a-ba23-f83d6450e4ab", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:01.000Z", "modified": "2018-03-13T13:49:01.000Z", "pattern": "[file:hashes.MD5 = '4751f5e3b35e143a71c996fab767fd94' AND file:hashes.SHA1 = 'e2c992c24702a19cd82db1a15eac75969962ec5c' AND file:hashes.SHA256 = '5d902968cb85bfa17f280d8b4ab9757b650760638f39ed43301053f67b67c5fe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--35347bf8-788b-482c-b431-3b6258b1e9b8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:01.000Z", "modified": "2018-03-13T13:49:01.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5d902968cb85bfa17f280d8b4ab9757b650760638f39ed43301053f67b67c5fe/analysis/1520838986/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6cd-cc70-418b-9214-4cc502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6cd-5cc8-4046-971f-47c702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 07:16:26", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6cd-8624-4eaf-b7bd-43d202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8e08f62d-c431-4475-a0da-023c8f670606", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:05.000Z", "modified": "2018-03-13T13:49:05.000Z", "pattern": "[file:hashes.MD5 = 'be6cf8e8ad3f4aa06d407fff3a95dc7e' AND file:hashes.SHA1 = 'bf1ce15de4d6cdf9a3e9abe72383589caf4aa6d1' AND file:hashes.SHA256 = '528bcdce7e1fc467c414267d8ab1cd0022071bc4ca304d2cbb90446f2540d799']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a3062c18-d293-46c0-9175-e3c86691eea4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:03.000Z", "modified": "2018-03-13T13:49:03.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/528bcdce7e1fc467c414267d8ab1cd0022071bc4ca304d2cbb90446f2540d799/analysis/1520438647/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6cf-f680-44bc-bfd0-483302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6d0-4dac-453a-8bff-41b402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:04:07", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6d0-a988-4be2-a49e-40a202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cb23222d-61f4-420f-97e5-208d0df4d905", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:07.000Z", "modified": "2018-03-13T13:49:07.000Z", "pattern": "[file:hashes.MD5 = '9f139853e3b03ec7b833cd731cf9b171' AND file:hashes.SHA1 = '9d45536fcca3da6c12d36337a324d864121ddc6a' AND file:hashes.SHA256 = 'a5c8ec7e44ca6bdbb20f1234df90d2937372f629f9c0d39d5f4eac0c8e716653']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b3c43305-f706-4271-a3cc-9dd6a47f013e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:06.000Z", "modified": "2018-03-13T13:49:06.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a5c8ec7e44ca6bdbb20f1234df90d2937372f629f9c0d39d5f4eac0c8e716653/analysis/1520376462/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6d2-1788-4e7a-9ae5-418d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6d2-b828-4179-8fa6-40db02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:42", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6d2-e2f8-442e-a00a-48ca02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--be84377d-270c-48ad-bd4e-797b86509254", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:10.000Z", "modified": "2018-03-13T13:49:10.000Z", "pattern": "[file:hashes.MD5 = 'd17899b0c380bfb74fdbf28e82aeab51' AND file:hashes.SHA1 = 'c25bc958ef7eea14ce46056f701bb8a697e65d40' AND file:hashes.SHA256 = 'abf127380298bbfa143f58fe58b862808d7ca5f52e1c5daf67f917efd3372639']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--54a18057-87d9-4091-a8f5-e919a6af8f8e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:08.000Z", "modified": "2018-03-13T13:49:08.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/abf127380298bbfa143f58fe58b862808d7ca5f52e1c5daf67f917efd3372639/analysis/1520488540/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6d4-490c-492b-873f-491402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6d5-648c-442b-a887-489402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:55:40", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6d5-5308-4f50-b24e-4a6502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b97217c8-a47e-418f-9dd7-089aaa3ad22c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:12.000Z", "modified": "2018-03-13T13:49:12.000Z", "pattern": "[file:hashes.MD5 = '7e0e4f8e9b0dc65261a5b3e569491527' AND file:hashes.SHA1 = '65ab7c928a752913e04f5b892a8ddb8b37835f76' AND file:hashes.SHA256 = '6e91eb5fbf5962ddd24011d73998d9c005779c32d8a763b57a5ffab0348a265f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:12Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--738e4e9c-f2c7-4297-90b3-6f559923bbf3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:10.000Z", "modified": "2018-03-13T13:49:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/6e91eb5fbf5962ddd24011d73998d9c005779c32d8a763b57a5ffab0348a265f/analysis/1518959567/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6d6-3be8-4e1a-a334-44af02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6d7-488c-4ee5-917e-43d102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-18 13:12:47", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6d7-4a8c-43f3-bee1-413702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e06f91b8-355e-4ea7-9de1-3aa5a3b948bc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:14.000Z", "modified": "2018-03-13T13:49:14.000Z", "pattern": "[file:hashes.MD5 = '92b9e6dd4e352a94a37f811ab864e618' AND file:hashes.SHA1 = '2c03f135bbf2c4be7b500c11a9e86b20acaf1ad8' AND file:hashes.SHA256 = '428f8a7ea9ae3e8c52f06afce39aeb65468acceeba9c77ed8c84c740ec61b5b6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9f13752e-3013-45e2-90ec-6b5a99066505", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:13.000Z", "modified": "2018-03-13T13:49:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/428f8a7ea9ae3e8c52f06afce39aeb65468acceeba9c77ed8c84c740ec61b5b6/analysis/1514997403/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6d9-a068-4ec9-b36c-4d1102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6d9-076c-495c-848c-449502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 16:36:43", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6d9-d0d4-40f0-a996-44ab02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d294a9bb-d773-4cf2-8e2a-3fd99391206f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:17.000Z", "modified": "2018-03-13T13:49:17.000Z", "pattern": "[file:hashes.MD5 = 'c22a09864092023ee9bff85b291626f2' AND file:hashes.SHA1 = '64b9665df0669e19a8a299d6b005b929c75f5211' AND file:hashes.SHA256 = 'fa019bb31fd99bfbb36bca3bf9b16c589cacd2f9cee2ba061dbb73479d4c389c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f61c6948-4f4b-4145-af51-b50999bace44", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:16.000Z", "modified": "2018-03-13T13:49:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/fa019bb31fd99bfbb36bca3bf9b16c589cacd2f9cee2ba061dbb73479d4c389c/analysis/1425551882/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6dc-dbf0-4113-8f6e-49b902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/57", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6dc-8cd4-4258-8a44-449702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2015-03-05 10:38:02", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6dc-0184-47aa-bdbc-40c202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--82299055-ed80-4537-80f5-9436f519f766", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:20.000Z", "modified": "2018-03-13T13:49:20.000Z", "pattern": "[file:hashes.MD5 = '6f347d19fcc0d336809ac1c49fdef3c2' AND file:hashes.SHA1 = '4443502cfd80dd39d3c49943df0264872a7bc4c7' AND file:hashes.SHA256 = 'f7dd9c3111f0e0ed831ecf858f98a95389818378526a5c69e0cfea1977638d0a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2d2f3ea6-6d2a-46eb-8fa7-fe52ec43d7be", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:18.000Z", "modified": "2018-03-13T13:49:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f7dd9c3111f0e0ed831ecf858f98a95389818378526a5c69e0cfea1977638d0a/analysis/1520441396/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6df-eb64-4d56-bd9a-457302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6df-fe54-4eb0-a926-4c8802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:49:56", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6df-65fc-4d79-92ad-42bd02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d6278a28-8753-4bd3-b5dd-b615a535c947", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:23.000Z", "modified": "2018-03-13T13:49:23.000Z", "pattern": "[file:hashes.MD5 = '0eb8f30a1b29a3e6ce1d72a417ba7a7a' AND file:hashes.SHA1 = 'fada0c4098da7ff58744bddbe035d405dc04f26c' AND file:hashes.SHA256 = '11c09386ec4cc88136bf85bf2437a28e385d42fea053e95b3d6eb5995e0fabc3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e8b635f4-5d5b-4caf-9d35-c214b6dab867", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:21.000Z", "modified": "2018-03-13T13:49:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/11c09386ec4cc88136bf85bf2437a28e385d42fea053e95b3d6eb5995e0fabc3/analysis/1520437419/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6e1-7818-42ee-a3f6-401e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6e1-49a0-456e-9024-4ce902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:43:39", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6e1-e698-4381-9921-427802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cb61ffc7-25b6-4635-af6f-bed3089af7e9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:25.000Z", "modified": "2018-03-13T13:49:25.000Z", "pattern": "[file:hashes.MD5 = '8c5ecc13e19fecd5215e191f73e40bfe' AND file:hashes.SHA1 = '6d1d952a34b0a40f44adbfd08ed1970cda0a1581' AND file:hashes.SHA256 = 'cfde9188f77427c56c541fba1ff15249dbdf2baf3f466367ba72a5c9a70b0d80']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--804d7a0d-4a71-44fc-a954-6dc9def20bbf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:23.000Z", "modified": "2018-03-13T13:49:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cfde9188f77427c56c541fba1ff15249dbdf2baf3f466367ba72a5c9a70b0d80/analysis/1520376479/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6e3-a784-4919-9143-498302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6e4-e748-4593-a4ff-458702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6e4-6c84-48f3-8e23-42df02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cccbb05d-835e-45c2-8022-a743d3ad5851", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:27.000Z", "modified": "2018-03-13T13:49:27.000Z", "pattern": "[file:hashes.MD5 = '29ceb92955f0ffc8d347f51555ae46a5' AND file:hashes.SHA1 = '79321be62ec5edcdb3023b460125939d41e541cb' AND file:hashes.SHA256 = 'cc3ceb50174349d9346cee8c330b9d172c8260a7a98d38de34c5322cce53c31b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8d5816f1-dcb6-4f83-8356-64b3ec5b3ba2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:25.000Z", "modified": "2018-03-13T13:49:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cc3ceb50174349d9346cee8c330b9d172c8260a7a98d38de34c5322cce53c31b/analysis/1517924356/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6e5-b7c4-41f6-970c-4fc902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "26/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6e6-83f4-44fb-bbea-40dd02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-06 13:39:16", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6e6-eaac-4a71-9799-49de02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d7d6852a-a95e-4d3a-84cb-06b3701e6a6a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:29.000Z", "modified": "2018-03-13T13:49:29.000Z", "pattern": "[file:hashes.MD5 = '228a7bb6a6d10523afff39da47621133' AND file:hashes.SHA1 = 'a7a638420c84ea2957df25d9798859ff9c6d7744' AND file:hashes.SHA256 = 'ff9785c05c08789800db47812c4e70ab892ecdba07189aa38fe0edbc4b87837d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c3a835d0-178c-475e-8d29-863ad198edde", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:28.000Z", "modified": "2018-03-13T13:49:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ff9785c05c08789800db47812c4e70ab892ecdba07189aa38fe0edbc4b87837d/analysis/1519707150/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6e8-2d94-47e1-99ab-478d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6e8-fec0-443e-ab22-476002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-27 04:52:30", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6e8-2064-4a4b-9cc4-45ca02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--82a15bb8-9f6d-407e-b744-bb8b9fee2159", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:32.000Z", "modified": "2018-03-13T13:49:32.000Z", "pattern": "[file:hashes.MD5 = 'ca703ae06d20fb248e0dd87f4e66a68e' AND file:hashes.SHA1 = '6bcf9f721258a7cd6940239ae4f721f099169f39' AND file:hashes.SHA256 = '125c1da1e9c3806a36d83676288e25226be564dd8ae941df4b3fb3f3a1fec31c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f2656df0-ab61-4366-972e-eb7ccf26e9f3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:30.000Z", "modified": "2018-03-13T13:49:30.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/125c1da1e9c3806a36d83676288e25226be564dd8ae941df4b3fb3f3a1fec31c/analysis/1520437471/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6ea-88d8-481b-9673-41c002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6ec-5430-4e41-aca7-4adb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:44:31", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6ec-8e24-439d-b773-49be02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--69820f4d-ae64-4f60-b206-e7f473a8bb57", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:35.000Z", "modified": "2018-03-13T13:49:35.000Z", "pattern": "[file:hashes.MD5 = 'd0bac2b89f5b1efb34ad5f2899d9d44b' AND file:hashes.SHA1 = '4583954a455e6300adf43244fdc35dedb5c17458' AND file:hashes.SHA256 = '862432919f8db0049b9a3d59a3511898ad9bc220c0c64ac4a4cb97caff745326']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1712c055-825b-4483-a0d3-dfaa467814df", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:33.000Z", "modified": "2018-03-13T13:49:33.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/862432919f8db0049b9a3d59a3511898ad9bc220c0c64ac4a4cb97caff745326/analysis/1514997379/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6ed-4880-4d9c-a3e6-49b502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6ee-12c4-4ee7-be5e-42f202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 16:36:19", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6ee-0e34-4d0b-8b92-4d8b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1244ab55-e050-4f27-8815-9829d0d09a58", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:37.000Z", "modified": "2018-03-13T13:49:37.000Z", "pattern": "[file:hashes.MD5 = '038b69655eb6476e197279d7e4de680c' AND file:hashes.SHA1 = 'c0db4e556fa193734ff774bc25f9eb4b59717e1b' AND file:hashes.SHA256 = '3d7b183262dc42e6efd8d0c30bc6528c8f3847cb6b6c633b211e18fe4a9723eb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--51b0df0d-f04c-4a11-8e09-bb63da256b07", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:35.000Z", "modified": "2018-03-13T13:49:35.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3d7b183262dc42e6efd8d0c30bc6528c8f3847cb6b6c633b211e18fe4a9723eb/analysis/1520488434/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6f0-1590-473b-8777-482a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6f0-1b50-4660-bcc0-419e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:53:54", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6f0-4bbc-4b36-9b9e-46d602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3308282a-8f19-47ed-81c4-f5f8cd8d007a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:39.000Z", "modified": "2018-03-13T13:49:39.000Z", "pattern": "[file:hashes.MD5 = 'f6fb5b337e32d38ed7f4fd77c982a443' AND file:hashes.SHA1 = 'b99e123791d84c22984c71549238a421a9c6cca1' AND file:hashes.SHA256 = 'f987fa5e278b9998b9c44c723a1892f92868da0b0c856777147fe1b10c7a45ed']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--cf6405fd-7401-4d60-a130-a6224cc18428", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:38.000Z", "modified": "2018-03-13T13:49:38.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f987fa5e278b9998b9c44c723a1892f92868da0b0c856777147fe1b10c7a45ed/analysis/1505902909/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6f2-4a1c-48b6-b1b2-422302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "40/64", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6f2-64dc-42c4-bd13-463702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-09-20 10:21:49", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6f2-8a1c-46bd-9829-4e1d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b7aed3f9-8bbc-49b9-96ef-1185d97372fd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:42.000Z", "modified": "2018-03-13T13:49:42.000Z", "pattern": "[file:hashes.MD5 = 'f25b450be296f859caee775f42da3721' AND file:hashes.SHA1 = '166361fd7c169863e2e0e8097f8c558e638fd1d6' AND file:hashes.SHA256 = 'de9b33b92113cbd0ec51b9e13596f5320d45bbb7b0222a6a17ed2867a2ff68bb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3e466307-8e1a-4b17-b923-67ccffe9fb67", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:40.000Z", "modified": "2018-03-13T13:49:40.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/de9b33b92113cbd0ec51b9e13596f5320d45bbb7b0222a6a17ed2867a2ff68bb/analysis/1519787666/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6f4-e9c8-48cb-8cdf-4a2002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6f4-d5f0-400b-92b4-479c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-28 03:14:26", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6f4-7954-4b09-92b2-4e5c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--21b42c11-3463-4f2e-9cf5-dc2f947712eb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:44.000Z", "modified": "2018-03-13T13:49:44.000Z", "pattern": "[file:hashes.MD5 = 'cc4a9899155402a40357fea885eb2b5f' AND file:hashes.SHA1 = '6be5594b8d81df53dcfbbac7ff07e93bf04f446a' AND file:hashes.SHA256 = '3e0c7e9f5acd8022624325492ab52fbe9df08f03cba21f137d5feb12185a2a3b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5f436b33-8051-4e11-85ac-d19712b3b5f0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:42.000Z", "modified": "2018-03-13T13:49:42.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3e0c7e9f5acd8022624325492ab52fbe9df08f03cba21f137d5feb12185a2a3b/analysis/1520376513/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d6f6-3b68-4bde-a662-403402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6f6-0168-48f5-8ea5-49f602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:33", "category": "Other", "comment": "Executable File", "uuid": "5aa7d6f6-9c50-4362-acf7-47f802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--83a08501-1293-44f5-972c-a638468112d9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:46.000Z", "modified": "2018-03-13T13:49:46.000Z", "pattern": "[file:hashes.MD5 = 'ad41641fc3eb31fe2130b5358e39b724' AND file:hashes.SHA1 = 'd448756c51b53ec040d4b80f02fa59276b26560b' AND file:hashes.SHA256 = 'd7841ad990416b6c46e98331ca6ca133be96dd1c463407f1b0e4bc759b002cfa']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4578fb47-f580-41dd-a90f-baa104b9d39b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:44.000Z", "modified": "2018-03-13T13:49:44.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d7841ad990416b6c46e98331ca6ca133be96dd1c463407f1b0e4bc759b002cfa/analysis/1520870700/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6f9-6600-44ea-a00d-4a4902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6f9-eed0-4189-9507-415d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 16:05:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6f9-c2d0-43bd-a2b6-40d902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dfdd74ed-2446-41e7-bf1d-e876e277a29d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:48.000Z", "modified": "2018-03-13T13:49:48.000Z", "pattern": "[file:hashes.MD5 = '63074bf458228184828d9938941dd12c' AND file:hashes.SHA1 = '81e9ad0bb72e459f2fd47c89cacd01c0efe3fb30' AND file:hashes.SHA256 = 'e4d735594547dc26fbb13846676cdaf387120da23756b4d5ae563da8a7609f3a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--57ebad98-e219-4c11-8ba9-e89e7c956763", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:47.000Z", "modified": "2018-03-13T13:49:47.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e4d735594547dc26fbb13846676cdaf387120da23756b4d5ae563da8a7609f3a/analysis/1517924354/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6fb-07d4-431f-9877-4fc802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6fb-193c-4567-8d42-446e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-06 13:39:14", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6fb-65f0-4075-bd20-4a5d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9bc65993-ca59-4309-83d8-0444b2fb8c06", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:51.000Z", "modified": "2018-03-13T13:49:51.000Z", "pattern": "[file:hashes.MD5 = '8bb3ba30f2d004437b878829c54c84bf' AND file:hashes.SHA1 = '36bd8afb99dc238c2b90d61f43219be331714e5d' AND file:hashes.SHA256 = 'd1509de315be40dac5807a016fd4c843abda063012d29732720db7087bb73f1b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--af6df848-4958-4d51-b02b-f26f53e48132", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:49.000Z", "modified": "2018-03-13T13:49:49.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d1509de315be40dac5807a016fd4c843abda063012d29732720db7087bb73f1b/analysis/1515019229/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d6fd-598c-450d-9b9b-4c3402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "27/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6fe-391c-49b0-80ee-47b702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 22:40:29", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d6fe-76e8-4823-a370-442502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--978c6c81-588f-493c-b3db-a6d8a2a47990", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:53.000Z", "modified": "2018-03-13T13:49:53.000Z", "pattern": "[file:hashes.MD5 = '7b05ddf250dc05dc6135723ff0389407' AND file:hashes.SHA1 = 'b0b1aa9b4b748617fc8306e0cbf9cc139cc6b3c8' AND file:hashes.SHA256 = '08281fb7677a651351a9b0a1ad5c4dace6748104d210cf6f9aecce0935b31007']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--aea5d4a9-d27a-4a59-b732-317d060c8df3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:51.000Z", "modified": "2018-03-13T13:49:51.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/08281fb7677a651351a9b0a1ad5c4dace6748104d210cf6f9aecce0935b31007/analysis/1520437282/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d700-09cc-4c90-9f43-43f802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d700-0f54-4c1d-8122-4af002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:41:22", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d700-8a90-400e-8fe1-4a3502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b4ac89c0-7022-47ba-b5b6-b7d6f505aebd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:55.000Z", "modified": "2018-03-13T13:49:55.000Z", "pattern": "[file:hashes.MD5 = '1e785429526cc2621baf8bb05ed17d86' AND file:hashes.SHA1 = 'da4247104540eb884f41780e675d8b3e1c116faa' AND file:hashes.SHA256 = '00e3bcfd0ef917c73c5a3818daf5bc0271fb3da53817df1215c20bfa5e4e91da']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--cea5961c-f56f-47ed-805c-8ead55535284", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:54.000Z", "modified": "2018-03-13T13:49:54.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/00e3bcfd0ef917c73c5a3818daf5bc0271fb3da53817df1215c20bfa5e4e91da/analysis/1520873400/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d702-073c-45ae-a0ae-46e902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d702-1fb8-4e7d-a009-468302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 16:50:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d702-2d20-4119-840b-452d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5c173e41-3f6a-45b7-8dc3-9fd00209ec77", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:57.000Z", "modified": "2018-03-13T13:49:57.000Z", "pattern": "[file:hashes.MD5 = 'e6491fb88600c6dad54a9bc22374d697' AND file:hashes.SHA1 = 'b055ab57f2b0276d859be243a9240965637aa4bd' AND file:hashes.SHA256 = '9e0ec586bb991db7b41440e6ab3988f7b379c17e7a8963e8f41ab153960b5b24']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:49:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e8449b46-a354-467e-9e49-68031b6e1752", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:56.000Z", "modified": "2018-03-13T13:49:56.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9e0ec586bb991db7b41440e6ab3988f7b379c17e7a8963e8f41ab153960b5b24/analysis/1520488374/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d704-a0b4-4d67-9832-4e7502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d704-5350-4da3-8adc-4d1502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:52:54", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d704-742c-46df-875f-488702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--620fa80a-ff56-4958-893f-c9178f12924a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:00.000Z", "modified": "2018-03-13T13:50:00.000Z", "pattern": "[file:hashes.MD5 = 'e9aea6fbdff039686afefe629db6c23e' AND file:hashes.SHA1 = '509e62d2c8df86d102716909db0f17e79c4d0f84' AND file:hashes.SHA256 = '4e6d9c92c20174b07a6582b5dcc862536fbdce1a5964340dc5b238b3885985d2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f6d1820f-b409-4ae6-8576-398772a06e02", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:49:58.000Z", "modified": "2018-03-13T13:49:58.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4e6d9c92c20174b07a6582b5dcc862536fbdce1a5964340dc5b238b3885985d2/analysis/1512568369/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d706-ab3c-4dd1-a18e-4c4b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "43/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d706-82dc-4ccc-90ba-4b7802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-06 13:52:49", "category": "Other", "comment": "Executable File", "uuid": "5aa7d706-76ac-4023-bb67-451202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2b5a4323-cc12-4e0f-b80f-932c607e3061", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:02.000Z", "modified": "2018-03-13T13:50:02.000Z", "pattern": "[file:hashes.MD5 = '9357ef1690f7d4435d37553c760acc3e' AND file:hashes.SHA1 = '6b10b9c7a6e9e156171b775f2a5a7cd7a84e9d93' AND file:hashes.SHA256 = 'be5e420236c341bac83cdcfe4e3ec58ac9b32ca2c36af1596bf0e3642ab29d1c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--914a9489-58b9-4d1c-9bfd-c89783e85427", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:00.000Z", "modified": "2018-03-13T13:50:00.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/be5e420236c341bac83cdcfe4e3ec58ac9b32ca2c36af1596bf0e3642ab29d1c/analysis/1520440893/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d708-7170-462b-b8e1-477202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d709-1bec-48ef-b95e-438402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:41:33", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d709-9f74-4f75-a4eb-4a4302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5fa6a990-0c0c-45a2-b44f-8f6b2fb92d30", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:04.000Z", "modified": "2018-03-13T13:50:04.000Z", "pattern": "[file:hashes.MD5 = 'a78829d6528c7894d54cbb6232a99c79' AND file:hashes.SHA1 = '27f2d19d3bd95fe7ca8d257594e704ff55960eaf' AND file:hashes.SHA256 = '7e270f53bd36b34ef6f9e711b1943b582c95a7bac27263356e9d97273a3dbabe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--29ed7fda-0038-4836-890f-220300a61011", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:03.000Z", "modified": "2018-03-13T13:50:03.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7e270f53bd36b34ef6f9e711b1943b582c95a7bac27263356e9d97273a3dbabe/analysis/1520906460/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d70b-f904-4e80-b57d-4f2c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d70c-c4b8-47f8-97e6-4d6402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 02:01:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d70c-c730-415c-a722-4c8802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b8edda24-98d3-4d12-b8f1-0b075e5127e1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:07.000Z", "modified": "2018-03-13T13:50:07.000Z", "pattern": "[file:hashes.MD5 = 'be781592db7b68fcc27aeefe5dbec8b1' AND file:hashes.SHA1 = 'd4925c4922a8a989617812d58bac72dfb3e59212' AND file:hashes.SHA256 = 'c1c6df93b8a8be0778e11214954017d9bf9971e30bef80a4c2031aadb2c63e3b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f17b3e60-ddc8-4acf-9c1a-23484fb6bdb4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:05.000Z", "modified": "2018-03-13T13:50:05.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/c1c6df93b8a8be0778e11214954017d9bf9971e30bef80a4c2031aadb2c63e3b/analysis/1515018304/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d70e-d8c8-4959-833b-437002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d70e-2830-467f-babb-442402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 22:25:04", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d70e-a8b8-42de-a6f7-481802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--856f07d3-d2ca-4f97-bcc9-9c42047e154b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:09.000Z", "modified": "2018-03-13T13:50:09.000Z", "pattern": "[file:hashes.MD5 = '1696135d04503e48e29ffa3474a5a76a' AND file:hashes.SHA1 = 'f5ffa229079f22616cbed51e2daf713cbed8e417' AND file:hashes.SHA256 = '73c3d7970dea0238c98275f925f18d4f3a66237a6b270a2732cca31193612f90']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e81ed941-5baf-4a9f-9478-1a82e2806177", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:08.000Z", "modified": "2018-03-13T13:50:08.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/73c3d7970dea0238c98275f925f18d4f3a66237a6b270a2732cca31193612f90/analysis/1520439216/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d710-9b64-4db9-9b9a-475102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d710-5924-439b-9812-402902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:13:36", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d710-c834-46d6-a679-4d2502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--67d15086-8265-4536-835f-eacf118dbdcf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:11.000Z", "modified": "2018-03-13T13:50:11.000Z", "pattern": "[file:hashes.MD5 = 'a755452d568062234058f69114bf3ee2' AND file:hashes.SHA1 = 'cab8950cc622639eea40ffcc0356d22fc8d0cac0' AND file:hashes.SHA256 = 'b4b6baca1104b0dbb289731c3b206cfeaefe58a23f45182e0d4f44069a7f5f39']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4934a6eb-4335-4e88-ac95-11ec7ce3d651", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:10.000Z", "modified": "2018-03-13T13:50:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b4b6baca1104b0dbb289731c3b206cfeaefe58a23f45182e0d4f44069a7f5f39/analysis/1514997403/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d712-d574-40c7-b05a-42b102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d712-58d8-432d-8a59-442c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 16:36:43", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d712-1c0c-4608-b9ec-435002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--914b8dcb-39b8-41e6-9314-701cb1685d55", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:15.000Z", "modified": "2018-03-13T13:50:15.000Z", "pattern": "[file:hashes.MD5 = 'fa7c4c891eeea64acb6b517da7cf2615' AND file:hashes.SHA1 = '861fd776cdad3147e66cd7318c5656fabae5d310' AND file:hashes.SHA256 = 'd2b3946be545c3da30e779f60e73db1796073d6ca5ebef49a7cea7a75169cabf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c3b196f2-3089-4461-9f1e-e2ded8cc54fb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:13.000Z", "modified": "2018-03-13T13:50:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d2b3946be545c3da30e779f60e73db1796073d6ca5ebef49a7cea7a75169cabf/analysis/1515019336/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d715-debc-4755-88d5-48f002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d716-5e9c-4856-a379-455602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 22:42:16", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d716-3af0-4318-a461-40d902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d2a0d57f-8bd4-4f7a-bd2f-558d1ccc9e42", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:17.000Z", "modified": "2018-03-13T13:50:17.000Z", "pattern": "[file:hashes.MD5 = 'b53ef9daae55e9850bd5c41f7ef4ea38' AND file:hashes.SHA1 = 'f4e221406d2339df73b44edb795e426b8024ee93' AND file:hashes.SHA256 = 'c097751002442abbcb8c85e5df07d64fae35c03789a4dfe364ffd3b5496891b4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--994a0748-7980-4a57-a95b-2ea57fd7169c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:15.000Z", "modified": "2018-03-13T13:50:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/c097751002442abbcb8c85e5df07d64fae35c03789a4dfe364ffd3b5496891b4/analysis/1520440972/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d717-6124-47bd-b146-489002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d718-38b0-413d-9940-4c4602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:42:52", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d718-ba7c-4bdd-b629-48db02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--08a40cfc-aaa0-4762-9aec-343975e97a59", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:19.000Z", "modified": "2018-03-13T13:50:19.000Z", "pattern": "[file:hashes.MD5 = '36a9a7bd068cc0c894b71dd1f7a7ec24' AND file:hashes.SHA1 = 'f6a1b97bf7e19ba920ace5bf4991c4b94784d3f0' AND file:hashes.SHA256 = '24d67b732f5d7ef320f1ab4a301fa9bf610dd9a831926f0cde8d4bae1c286700']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7c08f3f9-329e-409a-b4e2-ee8071725fdd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:17.000Z", "modified": "2018-03-13T13:50:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/24d67b732f5d7ef320f1ab4a301fa9bf610dd9a831926f0cde8d4bae1c286700/analysis/1517020329/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d719-3288-4240-b718-41cf02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "45/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d71a-ee04-48bc-a594-4c8802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-27 02:32:09", "category": "Other", "comment": "Executable File", "uuid": "5aa7d71a-ad80-4592-ae6a-4ede02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d9defefd-c657-4cd9-b750-a295b80285fa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:21.000Z", "modified": "2018-03-13T13:50:21.000Z", "pattern": "[file:hashes.MD5 = '1e6bbdfc4c78a748a1cdbd34a7def84b' AND file:hashes.SHA1 = '3867602cf0742a2c6c42f0e204dd653fb80b5d50' AND file:hashes.SHA256 = '4f3cfee867adf239e4637a845b991edd4e523aa525101875492273f913013a56']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--70c8bcb8-ca3d-4852-b4aa-8638899816c6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:20.000Z", "modified": "2018-03-13T13:50:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4f3cfee867adf239e4637a845b991edd4e523aa525101875492273f913013a56/analysis/1520438461/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d71c-1b9c-42f7-a941-411f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d71c-ec78-490f-a6bd-4fd102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:01:01", "category": "Other", "comment": "Executable File", "uuid": "5aa7d71c-2f24-4e7f-ba80-4fb302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c227e4dc-e420-45cb-9f53-1126208d93ed", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:24.000Z", "modified": "2018-03-13T13:50:24.000Z", "pattern": "[file:hashes.MD5 = '3bbbd82c039133da3e0b778c3aa5d041' AND file:hashes.SHA1 = '392aeb8bae8e3c66a5a70386214e084c9158c04d' AND file:hashes.SHA256 = '5b78f940c8376754517bfab8ca6ec1ebf978e5d32deef002a1715b39646a3407']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--cbca6d38-3a3d-4c08-bec0-22e39f71f2eb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:22.000Z", "modified": "2018-03-13T13:50:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5b78f940c8376754517bfab8ca6ec1ebf978e5d32deef002a1715b39646a3407/analysis/1520868360/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d71e-101c-47d7-85d8-454502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d71e-5864-4894-82c9-4a3e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 15:26:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d71e-fc30-43f6-927b-4e8a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ddc8833c-f045-429a-9866-12bc325e4a8d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:26.000Z", "modified": "2018-03-13T13:50:26.000Z", "pattern": "[file:hashes.MD5 = 'adaf5a1f3605fcb4e8fc28f0be63d211' AND file:hashes.SHA1 = '2a1c26af0ebc33d2b96983d3da08e638b0c7be60' AND file:hashes.SHA256 = '4f268fc02c92d31707c728858c295b61c1a199296001e90e7a40bf56ed7d9faf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8f991164-986e-4588-84a1-017fc4940631", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:24.000Z", "modified": "2018-03-13T13:50:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4f268fc02c92d31707c728858c295b61c1a199296001e90e7a40bf56ed7d9faf/analysis/1520438434/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d720-0958-4203-bceb-431f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d721-93bc-40cb-be04-4e3f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:00:34", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d721-7d04-4f77-b1ee-443b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--413a18c9-945a-4bd1-b541-691bc530c2fa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:28.000Z", "modified": "2018-03-13T13:50:28.000Z", "pattern": "[file:hashes.MD5 = 'd939f16bc039deefba9dd3cc06d925d2' AND file:hashes.SHA1 = '43df8874c41470f24eebf0c31e704c1845fe9f00' AND file:hashes.SHA256 = '1c980aba3c079b000d2a3c3431aaae37a34949d40c6e4d41721d06b53983d6d5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7e632066-66c8-4b57-844b-3e57c53c0644", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:26.000Z", "modified": "2018-03-13T13:50:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/1c980aba3c079b000d2a3c3431aaae37a34949d40c6e4d41721d06b53983d6d5/analysis/1520376506/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d722-336c-42af-a11c-411302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d723-0708-4d5a-b69a-46a302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:26", "category": "Other", "comment": "Executable File", "uuid": "5aa7d723-3cb0-4bbd-b1e4-409602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5cf33f8d-dd97-4611-8b61-97b2763a0bd8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:30.000Z", "modified": "2018-03-13T13:50:30.000Z", "pattern": "[file:hashes.MD5 = '86f0f3b5b9f0ae67db3134f16f0c5596' AND file:hashes.SHA1 = '3a58ed052a301a1356c91f2d97d295d021dca68f' AND file:hashes.SHA256 = '6ab56fdc5593974aaea168539cdf70b33e0e18149a335d0762436f8d7cdec3ca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b267d777-f810-4701-b57b-47643fe6e370", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:28.000Z", "modified": "2018-03-13T13:50:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/6ab56fdc5593974aaea168539cdf70b33e0e18149a335d0762436f8d7cdec3ca/analysis/1520903160/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d725-2264-4baa-86d2-427102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d725-f5b0-4a5f-a1df-4c3e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 01:06:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d725-38a8-4f7c-a10c-416102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8a341ca2-f68a-45ed-9c09-cacdac4e43ba", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:32.000Z", "modified": "2018-03-13T13:50:32.000Z", "pattern": "[file:hashes.MD5 = '6c9dffa4318bd0f16b9684d6e49cda45' AND file:hashes.SHA1 = '6f865523b837c73b94fa9037106c525c89297898' AND file:hashes.SHA256 = '84639a788cc03eb09efb7c1b60883c37e5ac06eff0bff6d38022d64bf56f2330']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--949361d6-c71c-4ab9-b3b2-5fdef6a8549a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:31.000Z", "modified": "2018-03-13T13:50:31.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/84639a788cc03eb09efb7c1b60883c37e5ac06eff0bff6d38022d64bf56f2330/analysis/1520439585/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d727-1e38-4af5-ad3d-4b5502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d727-7430-428a-9d57-4e3502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:19:45", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d727-d7bc-42f0-bde1-45d202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--05e14172-6a5f-4438-9cf9-18601485fee8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:35.000Z", "modified": "2018-03-13T13:50:35.000Z", "pattern": "[file:hashes.MD5 = '3257ebbe62c168281fa49bf95de6a8fb' AND file:hashes.SHA1 = 'a6e0a6576eff5098f3ea02b3bb229eae11fc9c86' AND file:hashes.SHA256 = '659842f05b708a081d9f1e47317dcd1c5e4ffc09d00c3cb9a06de966ff429839']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--718abdcd-3f1f-4652-9751-33a11b262a4b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:33.000Z", "modified": "2018-03-13T13:50:33.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/659842f05b708a081d9f1e47317dcd1c5e4ffc09d00c3cb9a06de966ff429839/analysis/1520840315/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d729-1a78-4462-a049-449e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d72a-69c8-4ae1-8b44-49de02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 07:38:35", "category": "Other", "comment": "Executable File", "uuid": "5aa7d72a-c3a8-440b-9130-41c302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ac9429a8-1a38-443b-ac79-947e77c20362", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:37.000Z", "modified": "2018-03-13T13:50:37.000Z", "pattern": "[file:hashes.MD5 = '54841887d7bad7c3eecb7d9261d41b72' AND file:hashes.SHA1 = '8db7b1706d9eb83cf05418b3bfba65882e66475c' AND file:hashes.SHA256 = '54b8b75b4714b1902e0bd46dcc14877b6a329e88ef7068a2855710b39ea7d13d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--64350fec-6cfd-440f-82ca-f42b591d4a6e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:35.000Z", "modified": "2018-03-13T13:50:35.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/54b8b75b4714b1902e0bd46dcc14877b6a329e88ef7068a2855710b39ea7d13d/analysis/1520903880/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d72c-6aa8-4375-a641-45fc02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d72c-bab8-48c4-abbb-40bc02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 01:18:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d72c-0784-4210-aa8d-42a502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--22d8e158-223c-4edb-b351-461809ff16af", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:39.000Z", "modified": "2018-03-13T13:50:39.000Z", "pattern": "[file:hashes.MD5 = '24309e61b949da868ea5f31b3f064c40' AND file:hashes.SHA1 = '18d64a9b1df49ccabc13344cbf57e94ae3f4b185' AND file:hashes.SHA256 = 'b044fd1e0ae000eeb04d0529b3920a38f839e910bfb6bb9d0837da22f0ace15e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d8c73c7c-20f0-4816-8447-5bfa171455f8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:38.000Z", "modified": "2018-03-13T13:50:38.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b044fd1e0ae000eeb04d0529b3920a38f839e910bfb6bb9d0837da22f0ace15e/analysis/1517765294/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d72e-52d0-47fc-9955-46b902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d72e-ee74-4620-917c-449702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-04 17:28:14", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d72e-ba80-4ca6-ab29-4d9b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bc5863ac-57aa-4555-91f3-f8cddfd3a380", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:41.000Z", "modified": "2018-03-13T13:50:41.000Z", "pattern": "[file:hashes.MD5 = '13b32557ffd89f5b79e73c235bb242f5' AND file:hashes.SHA1 = '5f3af6334f2518cf32c7e4dda4e0d1b513c3dd91' AND file:hashes.SHA256 = '9b48f0818738ddda0adce3560770e8618dac6bd341d5e116d967562146d51a7f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fd565702-5854-489b-9168-aa56033b44b8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:40.000Z", "modified": "2018-03-13T13:50:40.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9b48f0818738ddda0adce3560770e8618dac6bd341d5e116d967562146d51a7f/analysis/1520440176/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d730-f190-4ec3-a5ce-43ed02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d730-70ac-4f3b-b189-4e1f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:29:36", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d730-d848-45fb-b064-4a3a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--37650bda-445d-45fc-89bf-25645506db23", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:44.000Z", "modified": "2018-03-13T13:50:44.000Z", "pattern": "[file:hashes.MD5 = 'c7298cde42f023b0a6a15866aa61b7fb' AND file:hashes.SHA1 = '26cf4a9de1200db0bf6c7f7392824aff07472ae2' AND file:hashes.SHA256 = '44f52e01e59940e2d22a7b6473a76fc8bf326c4981fa4dea0f63234e62e151ad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--adf2edf5-1bf0-43ce-bb48-03b0d632410f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:42.000Z", "modified": "2018-03-13T13:50:42.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/44f52e01e59940e2d22a7b6473a76fc8bf326c4981fa4dea0f63234e62e151ad/analysis/1520438355/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d732-2cac-4bc3-b467-4c1102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d733-9b98-42cc-953a-460c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:59:15", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d733-2590-4b78-9792-4b6102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--12a9552f-dcfa-4b1b-b9a0-8577c5f592d5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:46.000Z", "modified": "2018-03-13T13:50:46.000Z", "pattern": "[file:hashes.MD5 = '0ae7629d3b3da9932f96e86b79ae7cb1' AND file:hashes.SHA1 = '02283942656fe875594bcaa03f779f22f428ea3b' AND file:hashes.SHA256 = 'e97db554bb5fe030afb67f0a683857d124e7e05942f6d77b637056758ac0a4c1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--996697de-50d0-4c27-ae0b-f7cf1d789da0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:44.000Z", "modified": "2018-03-13T13:50:44.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e97db554bb5fe030afb67f0a683857d124e7e05942f6d77b637056758ac0a4c1/analysis/1510451259/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d735-d530-4502-a06d-4bd402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d735-ff5c-4f0e-9d66-4ae902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-12 01:47:39", "category": "Other", "comment": "Executable File", "uuid": "5aa7d735-d950-4f76-9e96-4d5f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dc1da79a-987b-4226-998b-f6befaa03fb8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:48.000Z", "modified": "2018-03-13T13:50:48.000Z", "pattern": "[file:hashes.MD5 = 'fa3c6c48586890058c662a00fcff4e42' AND file:hashes.SHA1 = '94cbab468d20f0b010c2c09656f4ae66a6eb69c8' AND file:hashes.SHA256 = '836f470f458f72ffe7d9cb3de221ca9cacd2fccb1d209a3d11f30cf6304556ce']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1456abf1-55d0-43f6-9a4f-e91acc35882e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:47.000Z", "modified": "2018-03-13T13:50:47.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/836f470f458f72ffe7d9cb3de221ca9cacd2fccb1d209a3d11f30cf6304556ce/analysis/1508511928/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d737-d834-461b-8ba7-439a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/65", "category": "Other", "comment": "Executable File", "uuid": "5aa7d737-1fe8-4d33-a304-495002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-10-20 15:05:28", "category": "Other", "comment": "Executable File", "uuid": "5aa7d737-3240-4fb2-80b9-4a6302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4775ae1d-ebf4-42ae-88cb-2d9e7b7e3485", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:51.000Z", "modified": "2018-03-13T13:50:51.000Z", "pattern": "[file:hashes.MD5 = '9a59b37a50a5a79fc009edac7e50393a' AND file:hashes.SHA1 = '82d52d1f87cf6bb0eb7c9f342807388b987469d5' AND file:hashes.SHA256 = '7e10cc1030d10939aa05cbd498f74381e0770fa5418b574c42fa9628003d5fdd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:51Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--81d57356-7bd7-44dd-99fe-a227e1ac00ab", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:49.000Z", "modified": "2018-03-13T13:50:49.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7e10cc1030d10939aa05cbd498f74381e0770fa5418b574c42fa9628003d5fdd/analysis/1519135750/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d739-a2d8-42b5-9920-439f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "53/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d739-d0f4-4077-bb8b-481c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-20 14:09:10", "category": "Other", "comment": "Executable File", "uuid": "5aa7d739-ec88-4714-afb7-4c6c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8d8f022d-7e99-4d4b-9999-3c7bb3331ded", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:53.000Z", "modified": "2018-03-13T13:50:53.000Z", "pattern": "[file:hashes.MD5 = '3944464c989438ff54697b4e190c9b19' AND file:hashes.SHA1 = 'e0c315a7c217cb7cace5f307e5e1ea4d3761f899' AND file:hashes.SHA256 = 'e31f26fbb1265cef7403c4204fe2d47cf27617a6f9e166b2416cbffdafe34a28']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--720e4a35-25aa-4682-91b8-74d26d2c83ae", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:51.000Z", "modified": "2018-03-13T13:50:51.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e31f26fbb1265cef7403c4204fe2d47cf27617a6f9e166b2416cbffdafe34a28/analysis/1520488405/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d73b-9c20-4385-9820-42cf02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d73b-62a4-491d-bf67-47cf02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:53:25", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d73c-3408-4c8a-8259-480202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c0993f0e-c4c9-4607-8438-5f67688c20d6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:55.000Z", "modified": "2018-03-13T13:50:55.000Z", "pattern": "[file:hashes.MD5 = 'd948825d710c020e52fbac6225538d19' AND file:hashes.SHA1 = '1dfb4e575bf305e340bd7e323ee922df6b7f55cf' AND file:hashes.SHA256 = '15ab4446504c9510fe377fb8657f9b4b67935c2aedd725058c1a15bf446a4015']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3ce18542-570a-4988-b75b-702cfa1a3c1a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:53.000Z", "modified": "2018-03-13T13:50:53.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/15ab4446504c9510fe377fb8657f9b4b67935c2aedd725058c1a15bf446a4015/analysis/1520913240/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d73d-a92c-408e-9731-449402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "53/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d73e-561c-4321-8363-41fb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:54:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d73e-7408-4d06-9784-446202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--97971b0a-3559-409a-94ce-36fb05fbf4e6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:57.000Z", "modified": "2018-03-13T13:50:57.000Z", "pattern": "[file:hashes.MD5 = '8ac83e9e242038e9f8a2c43f8746cb0a' AND file:hashes.SHA1 = '802e63b863cb3c1e2fc47bf5760a4b40b786542b' AND file:hashes.SHA256 = '65f4b673130e7858063199c89cf12a100484bd4f1588eedc01ea9c46e2d7e11e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1627866d-dabf-4069-bbe2-355f3f0a9647", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:55.000Z", "modified": "2018-03-13T13:50:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/65f4b673130e7858063199c89cf12a100484bd4f1588eedc01ea9c46e2d7e11e/analysis/1513708624/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d740-29dc-47bd-b87d-4c8d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d740-5664-49a6-b09e-4c9202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-19 18:37:04", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d740-09d0-4c4a-8ba6-4e9702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0fa0b818-b2b2-482a-8567-cc8996d54f49", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:59.000Z", "modified": "2018-03-13T13:50:59.000Z", "pattern": "[file:hashes.MD5 = 'bbd86f3bf3efc9d5804eea574473bd43' AND file:hashes.SHA1 = '182d10f18270ab023d874784bcb221ccf96597a1' AND file:hashes.SHA256 = '3235914dde70f5f23899489bee7880fc5c121e28442e0349dcb7e266f2aab595']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:50:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--816947c3-4298-4ae3-bb19-8e2b8986ad81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:50:58.000Z", "modified": "2018-03-13T13:50:58.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3235914dde70f5f23899489bee7880fc5c121e28442e0349dcb7e266f2aab595/analysis/1517469628/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d742-565c-4258-a347-485f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d742-10c4-4a47-991d-459d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-01 07:20:28", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d742-76d8-453f-b7ad-4c3202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--66f170fb-5db2-4ede-ad9b-121ba032c974", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:02.000Z", "modified": "2018-03-13T13:51:02.000Z", "pattern": "[file:hashes.MD5 = '5fc0c8777cb1ac9ffd24a8b14925e265' AND file:hashes.SHA1 = '68831c665856c0505e52d1ccaba4ab6868175809' AND file:hashes.SHA256 = '43119f84aab92fb79d14eab9e40bea78f0793ae323be7cce04130b65f2861b5e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6af3ebc6-434f-441d-ae40-b876937c8612", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:00.000Z", "modified": "2018-03-13T13:51:00.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/43119f84aab92fb79d14eab9e40bea78f0793ae323be7cce04130b65f2861b5e/analysis/1520438302/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d744-763c-4c5d-943c-4cf402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d745-fe58-4057-80c0-479302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:58:22", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d745-c180-4aca-9b2c-4a8902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--21046835-1b5f-454d-8fa7-a0d11e43314a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:04.000Z", "modified": "2018-03-13T13:51:04.000Z", "pattern": "[file:hashes.MD5 = '1f45f5b5138763586539409bcaaa9d0d' AND file:hashes.SHA1 = '6c2a298e0e0edb4b2750bffa6b04b8d1cdf0b90c' AND file:hashes.SHA256 = '3c8336cc1d90a6bda731cd722bf83b41c7e67ea124db190cbee93f5e93f0aa29']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5ffcf6a5-9852-4f0e-a619-c557f9bafee2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:02.000Z", "modified": "2018-03-13T13:51:02.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3c8336cc1d90a6bda731cd722bf83b41c7e67ea124db190cbee93f5e93f0aa29/analysis/1520488279/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d747-fe90-4f74-85ad-4b9a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d747-ec9c-4530-83c7-494b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:51:19", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d747-8398-4619-96f4-4eea02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bc18d46f-3297-462b-bcd7-6db52efaf56b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:06.000Z", "modified": "2018-03-13T13:51:06.000Z", "pattern": "[file:hashes.MD5 = '13a49a2d267d7e96a9e10b5e0e1b2adf' AND file:hashes.SHA1 = '7757c380a9238d80a064e7e158abf7b55c2f8191' AND file:hashes.SHA256 = '15077e348ae73659d6421d206fa34055710689deeac1bb2d1c41d7a52adda610']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fe44dcc1-5471-4572-aebc-7fc43c58831b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:05.000Z", "modified": "2018-03-13T13:51:05.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/15077e348ae73659d6421d206fa34055710689deeac1bb2d1c41d7a52adda610/analysis/1518213343/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d749-9f04-421b-9ac9-443002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d749-c484-4570-a66d-432102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-09 21:55:43", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d74a-55a8-4d62-a4ed-404a02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9bff3672-c80a-4c16-b2cf-35a63fe86433", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:09.000Z", "modified": "2018-03-13T13:51:09.000Z", "pattern": "[file:hashes.MD5 = '45fde170eec6aca0c6db4c4044343e23' AND file:hashes.SHA1 = '8591d082074590978cf8477a727a72a19dd027a7' AND file:hashes.SHA256 = 'a52192465084e717ab601dda5a7d7f55530bdc206c84f634cc12467aede8c6c8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:09Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8670cf25-98a7-42aa-9cc2-e2e9d90a037a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:07.000Z", "modified": "2018-03-13T13:51:07.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a52192465084e717ab601dda5a7d7f55530bdc206c84f634cc12467aede8c6c8/analysis/1520850540/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d74b-0618-4e2c-a3c2-4d3e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d74c-31f0-44bc-9187-48b402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 10:29:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d74c-4950-4053-98a4-4fd202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4225cb42-201f-47ed-ad03-c0f4543cb253", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:11.000Z", "modified": "2018-03-13T13:51:11.000Z", "pattern": "[file:hashes.MD5 = '150c7891677c165c26418fb313cf33d0' AND file:hashes.SHA1 = '4fe88dba4bbedab222c2276b85d9fd6171403373' AND file:hashes.SHA256 = 'b221d49022a39106207a6630db8a135d1803178b9d7e536525979c578184f752']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--26451a75-cc08-4fbc-87da-436e2cde572f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:10.000Z", "modified": "2018-03-13T13:51:10.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b221d49022a39106207a6630db8a135d1803178b9d7e536525979c578184f752/analysis/1520499264/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d74e-8a9c-4b17-918a-4a3202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "22/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d74e-08a0-4e57-b9f3-410102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 08:54:24", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d74e-ab00-489c-bb30-489302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e43eb2dd-268c-4940-a19c-8c059cee8e40", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:14.000Z", "modified": "2018-03-13T13:51:14.000Z", "pattern": "[file:hashes.MD5 = '22d013541f27c6b017f805caedc7e1b0' AND file:hashes.SHA1 = 'f78e584d918e74e8e7ff343a8801b50324374cae' AND file:hashes.SHA256 = 'ad2cddbefebafe1b676c5429ce39ab46cb7cb947fa7f4ce4437e2bf8dc177cb5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c336794f-46a9-4009-b240-e5cad850bb96", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:13.000Z", "modified": "2018-03-13T13:51:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ad2cddbefebafe1b676c5429ce39ab46cb7cb947fa7f4ce4437e2bf8dc177cb5/analysis/1514987176/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d751-4fec-440d-816c-41b402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d752-c8bc-4856-b01f-473302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 13:46:16", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d752-e6c4-44ae-a5c9-411c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--da460413-76f6-41a0-a2b8-1542e365d0fb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:17.000Z", "modified": "2018-03-13T13:51:17.000Z", "pattern": "[file:hashes.MD5 = 'd38bf4f8675fc8e27d533e6c489bac03' AND file:hashes.SHA1 = 'ede200073e2e9db262b255a1fbe7bf61c5436075' AND file:hashes.SHA256 = 'e08f1f54620bafe44200b3e12177e6a934e2d27910125144aec9606b68d44a88']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0677e0d0-8a8b-4754-bb9e-68525e65a9d5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:15.000Z", "modified": "2018-03-13T13:51:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e08f1f54620bafe44200b3e12177e6a934e2d27910125144aec9606b68d44a88/analysis/1519360614/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d754-84f4-4e39-859d-404002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d754-9afc-4515-b143-438402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-23 04:36:54", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d754-4a74-4522-b8c6-4ea702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0b4ad0cd-6a11-4eb2-a62e-85f88be78b2a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:19.000Z", "modified": "2018-03-13T13:51:19.000Z", "pattern": "[file:hashes.MD5 = '9ce80da250a8eddd660d36a050c71b82' AND file:hashes.SHA1 = '92d149b1776c35ddd8255b075e3a74b9ceb7c117' AND file:hashes.SHA256 = 'b2b0fe8835f5cb0a941b876b48d7fda262b85b6fec15436e48fdd2003ed914d4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--49f5f1f3-16d8-4061-b055-0b6335db369b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:18.000Z", "modified": "2018-03-13T13:51:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b2b0fe8835f5cb0a941b876b48d7fda262b85b6fec15436e48fdd2003ed914d4/analysis/1520870356/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d756-e400-4efc-9138-40a002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d756-f984-406b-aa00-465e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 15:59:16", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d756-6ac0-4f92-b8e5-4fed02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--40314b91-c2b2-4eee-9c6b-2fe46238896e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:22.000Z", "modified": "2018-03-13T13:51:22.000Z", "pattern": "[file:hashes.MD5 = '6a870a4a3f63dc596865f2c8d98ea84e' AND file:hashes.SHA1 = '3997c797e07f5ae9a62443ee88b8d56d23b8f3fb' AND file:hashes.SHA256 = '73273151aa0dbe419d1564522a17d408d6b4fdf447571f323558b7e806e52d9d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6e14b2cc-41af-4ef4-8810-6dcf339bcfcf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:20.000Z", "modified": "2018-03-13T13:51:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/73273151aa0dbe419d1564522a17d408d6b4fdf447571f323558b7e806e52d9d/analysis/1520439190/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d758-0bb0-494e-8081-4e5302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d759-1340-4157-826c-43cf02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:13:10", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d759-c414-41aa-8aa4-4dc602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8823252f-4421-4a25-b020-6c4d71b72f3c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:24.000Z", "modified": "2018-03-13T13:51:24.000Z", "pattern": "[file:hashes.MD5 = 'e01552ea0cc476f3dbf67ff088d93b85' AND file:hashes.SHA1 = '091e925e7a18461331a5e5d000a0b535fc805410' AND file:hashes.SHA256 = 'eeca7f0a6bcb9132e9ada7c8913aa39eb87aed9955dcc7f870f7c85a3f415362']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--70eb97ff-b5cf-4a33-9c55-b66c838dc136", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:22.000Z", "modified": "2018-03-13T13:51:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/eeca7f0a6bcb9132e9ada7c8913aa39eb87aed9955dcc7f870f7c85a3f415362/analysis/1460569226/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d75a-4274-4fcc-a56f-458202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/57", "category": "Other", "comment": "Executable File", "uuid": "5aa7d75b-430c-48ac-999d-448102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2016-04-13 17:40:26", "category": "Other", "comment": "Executable File", "uuid": "5aa7d75b-b898-4b91-a074-44d402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4c585e51-1879-481c-a50b-8ecef2fbfee3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:26.000Z", "modified": "2018-03-13T13:51:26.000Z", "pattern": "[file:hashes.MD5 = '114fbf6ecc42b061ff1b28d34447a55e' AND file:hashes.SHA1 = 'af9780e3bcdd655a8b84feed50aef49d7b672037' AND file:hashes.SHA256 = '37da6dce2dd7ca03a502c53f0f8dec0c318184eefb694976bcc3aa6b5fa5a7de']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--13068af6-8ddc-4e99-a409-deda2159b103", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:25.000Z", "modified": "2018-03-13T13:51:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/37da6dce2dd7ca03a502c53f0f8dec0c318184eefb694976bcc3aa6b5fa5a7de/analysis/1520931789/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d75d-3b1c-4d9b-8029-46ba02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d75d-5cc4-41f3-bc26-473b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 09:03:09", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d75d-5848-4465-aa26-42f302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--37a19c4b-d0e7-42c7-9611-445522921890", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:29.000Z", "modified": "2018-03-13T13:51:29.000Z", "pattern": "[file:hashes.MD5 = 'd8d90989579b967e0699c40b65d2f464' AND file:hashes.SHA1 = '2e02f9156c85f59701bdc7bb80f8f35ad721baee' AND file:hashes.SHA256 = 'b8b7b45988030666a9f63e7cfaba1a6d7dc5daff3e788a0afe5e375b55f982eb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--edcfd0af-4e00-4bf3-bfb2-f5e14e215c96", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:27.000Z", "modified": "2018-03-13T13:51:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b8b7b45988030666a9f63e7cfaba1a6d7dc5daff3e788a0afe5e375b55f982eb/analysis/1490932474/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d75f-e384-431f-b2f9-430402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "45/62", "category": "Other", "comment": "Executable File", "uuid": "5aa7d760-771c-48fd-b990-460b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-03-31 03:54:34", "category": "Other", "comment": "Executable File", "uuid": "5aa7d760-fc70-4f1d-89a7-4bc902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1145dde9-b4a2-472a-9d5c-b9b6d48ed3a1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:31.000Z", "modified": "2018-03-13T13:51:31.000Z", "pattern": "[file:hashes.MD5 = '1231711812ceecce5163337c82aa1e7d' AND file:hashes.SHA1 = '99e2f9906d4480a1471853abb1755c44d414e749' AND file:hashes.SHA256 = 'cecc04094781c3d8440f54999d5b69e4ab7f4f2a3a0d6e85878ca60c0cafa34c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--06473880-41e8-46f2-b9c2-4cee0e116855", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:29.000Z", "modified": "2018-03-13T13:51:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cecc04094781c3d8440f54999d5b69e4ab7f4f2a3a0d6e85878ca60c0cafa34c/analysis/1520872920/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d762-18d4-4bf0-9066-405602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d762-8a84-469e-b2d8-458802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 16:42:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d762-7d98-4899-9cde-4fd402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b3edef8c-598d-40e5-bb2d-18647024b51b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:33.000Z", "modified": "2018-03-13T13:51:33.000Z", "pattern": "[file:hashes.MD5 = '7ec94f92fa50786738fdc3cd2d071b07' AND file:hashes.SHA1 = 'd877d1a75035b35609954f5741c055e1bedd5d97' AND file:hashes.SHA256 = '01b623a37359246c634d3a4fbb423fe8f23bc8921a6719be6b0b93cd0e071253']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fbbb0d5e-64de-4be0-90d7-a093afb63f88", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:32.000Z", "modified": "2018-03-13T13:51:32.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/01b623a37359246c634d3a4fbb423fe8f23bc8921a6719be6b0b93cd0e071253/analysis/1520437177/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d764-17e4-4145-92a3-423b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d764-8e8c-4fb0-8c95-40ed02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:39:37", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d764-6ae8-4a86-8683-4c8c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9acd5c23-ef98-40a7-bfc9-caf28c3f23eb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:36.000Z", "modified": "2018-03-13T13:51:36.000Z", "pattern": "[file:hashes.MD5 = 'c3f531ada7d94b20f564516b565f12b7' AND file:hashes.SHA1 = '6c30ec71b15664585eebd093b696dc79351c7974' AND file:hashes.SHA256 = '67295af71bb23da8e045537784bd5af5ca7ad4aa742517a022022e9142e38a14']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--aed42feb-e540-4b67-961c-f67718df57a6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:34.000Z", "modified": "2018-03-13T13:51:34.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/67295af71bb23da8e045537784bd5af5ca7ad4aa742517a022022e9142e38a14/analysis/1520488493/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d766-9e80-4a26-a1f1-448402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d766-b370-4222-b75c-459602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:54:53", "category": "Other", "comment": "Executable File", "uuid": "5aa7d766-9878-4b56-82f0-46d102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ab226ccc-8a64-436f-ad9a-9be4b5777b0f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:38.000Z", "modified": "2018-03-13T13:51:38.000Z", "pattern": "[file:hashes.MD5 = '5c45bdf8e2bcbca018725d062490be41' AND file:hashes.SHA1 = 'af9834e7e7888d2eec35efd15304f5698c1ea178' AND file:hashes.SHA256 = '4348b3da8a0a9df56a6a218f8ece0b313a04eb85446c58a2d5d0061baa5754f9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--44bf11f9-5d56-4ca4-882b-6702bcf34a30", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:36.000Z", "modified": "2018-03-13T13:51:36.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4348b3da8a0a9df56a6a218f8ece0b313a04eb85446c58a2d5d0061baa5754f9/analysis/1519867407/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d768-0590-4de7-a37f-4e6602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "45/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d769-e034-429c-afb6-404802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-01 01:23:27", "category": "Other", "comment": "Executable File", "uuid": "5aa7d769-4274-45ae-8222-490402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--927f792b-19a9-4c29-82a9-b32675909be3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:40.000Z", "modified": "2018-03-13T13:51:40.000Z", "pattern": "[file:hashes.MD5 = '9ac9a4db59d086d1d8abe08829766e81' AND file:hashes.SHA1 = '2200dfae4b82ed13b0f6c1c0ba7ac574fcc744e5' AND file:hashes.SHA256 = '7a2629e3505686c623cc001e684a95652b8ad7b8a8a697a106c116acdc25e421']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0d77908a-f0f7-4781-97d2-246bdbee37ec", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:38.000Z", "modified": "2018-03-13T13:51:38.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7a2629e3505686c623cc001e684a95652b8ad7b8a8a697a106c116acdc25e421/analysis/1517381672/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d76b-6fe0-47e3-b720-4f8702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d76b-459c-42dc-a115-4a9102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-31 06:54:32", "category": "Other", "comment": "Executable File", "uuid": "5aa7d76b-4860-4d73-8ef9-43a802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7a0a06e2-e651-4fd1-a48b-4b88352b1c4f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:42.000Z", "modified": "2018-03-13T13:51:42.000Z", "pattern": "[file:hashes.MD5 = '38135d60e9edcfe413aeb7549b6e7f38' AND file:hashes.SHA1 = 'a5e2302fef562aa54ad801b2fd19a33465f3915e' AND file:hashes.SHA256 = '2da98e19b1642bd55ea8365795f030789508cd88fbef81ce16877436ea2c1484']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1ecae68a-3fa0-46b5-9a9c-4ef390e211bd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:41.000Z", "modified": "2018-03-13T13:51:41.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/2da98e19b1642bd55ea8365795f030789508cd88fbef81ce16877436ea2c1484/analysis/1520437873/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d76d-dd20-4623-b610-4cb502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d76d-625c-423f-9d40-41dc02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:51:13", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d76d-0fb0-4311-9eca-4e3002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1c2f9b9e-1a6f-42bd-93ea-8b0df438103a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:45.000Z", "modified": "2018-03-13T13:51:45.000Z", "pattern": "[file:hashes.MD5 = '9ab3d830514a2619ae98d4449cf08860' AND file:hashes.SHA1 = '3b2974b7901f51dd935a0a606e7ce221565518d0' AND file:hashes.SHA256 = 'b964569f2697dcb72fd36076744995eec99a35f056826b6aab2c929e908d48ba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ffb0fd88-2cc2-46da-869b-788448ed5ca4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:43.000Z", "modified": "2018-03-13T13:51:43.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b964569f2697dcb72fd36076744995eec99a35f056826b6aab2c929e908d48ba/analysis/1520440761/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d76f-0ca8-47e5-beba-472402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d770-7a18-4d0c-ad83-459f02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:39:21", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d770-94b8-4e5b-ae09-400c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--80c4fd2c-a08f-4ba7-bc29-6e29ea981bd0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:47.000Z", "modified": "2018-03-13T13:51:47.000Z", "pattern": "[file:hashes.MD5 = '8752234ea0813c90a867cae0a15f26a7' AND file:hashes.SHA1 = '15883c196f0bad6fa225924faabe5656f1d62121' AND file:hashes.SHA256 = 'af392fe93ca1e02fa5c12284dab4a3c3f8eda251c86be8b1c54b8d6486c91242']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--42229f3c-506e-45d1-88d3-4e2c9f27ccad", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:46.000Z", "modified": "2018-03-13T13:51:46.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/af392fe93ca1e02fa5c12284dab4a3c3f8eda251c86be8b1c54b8d6486c91242/analysis/1520854200/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d772-6004-4acf-bd1d-4c0802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d772-5c6c-4063-a77b-478a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 11:30:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d772-d0dc-400f-a149-4a9902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8d8aeabc-15b4-40f9-9bc1-7b07df4455b7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:50.000Z", "modified": "2018-03-13T13:51:50.000Z", "pattern": "[file:hashes.MD5 = '314e533e5f7af75fcb0da934290ae6e1' AND file:hashes.SHA1 = '51575e91aeb11ad7fafdc25983c50f587f5b4a56' AND file:hashes.SHA256 = '92121041f5102caa8e0d95a48c32161648fe54c0f839ec54c8faf1595b0ea3d3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c7f784cb-512a-4528-b270-ea27855f4166", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:48.000Z", "modified": "2018-03-13T13:51:48.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/92121041f5102caa8e0d95a48c32161648fe54c0f839ec54c8faf1595b0ea3d3/analysis/1520488294/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d774-bdcc-4624-8d34-4e3602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d775-fd38-4c36-808a-4ddd02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:51:34", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d775-c57c-49c2-ab31-403802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--509e750c-3a95-40fa-ad9b-76f22cdc492b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:52.000Z", "modified": "2018-03-13T13:51:52.000Z", "pattern": "[file:hashes.MD5 = 'c753d246a1f9116f217ab26270608e2f' AND file:hashes.SHA1 = '67c050e935338a038e70999c4bd11932be4e7aa0' AND file:hashes.SHA256 = '57fdd5ceac9957edf992b03fb4f888d2d90991d1d8148f55f57c466127ea2e67']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--030a8ee8-106b-4afd-9a08-f135111ee17f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:50.000Z", "modified": "2018-03-13T13:51:50.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/57fdd5ceac9957edf992b03fb4f888d2d90991d1d8148f55f57c466127ea2e67/analysis/1512544559/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d777-94f0-4cb8-95ce-481902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d777-5e28-48b6-8cb8-4d0302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-06 07:15:59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d777-9c44-4d13-93e8-4be002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8aea02c3-b7ab-4049-a7d0-574248ffc5ce", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:54.000Z", "modified": "2018-03-13T13:51:54.000Z", "pattern": "[file:hashes.MD5 = '7d3b215f3fa77a0e6bb20612aecbacfa' AND file:hashes.SHA1 = '771c75a24462f8eca232d23456b297b1dbce1f79' AND file:hashes.SHA256 = 'f703df08f5e7388f4873137977cf1c96a24293a7bf93b952c586c27b34e4212e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9fe05add-499d-4dd5-a632-7f6283f12006", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:53.000Z", "modified": "2018-03-13T13:51:53.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f703df08f5e7388f4873137977cf1c96a24293a7bf93b952c586c27b34e4212e/analysis/1510366213/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d779-fbb0-4f26-8550-48b502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d779-3a10-40c7-b29d-406302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-11 02:10:13", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d779-a3ac-4a3d-94ac-46f102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9f4251f1-9409-47b5-a6ab-bb1b0eb81236", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:57.000Z", "modified": "2018-03-13T13:51:57.000Z", "pattern": "[file:hashes.MD5 = '81336760248faca7157bfd9c74b3f3f3' AND file:hashes.SHA1 = '90e0fb98c249ddad6010fcbd57aa6aef1c83cd00' AND file:hashes.SHA256 = '43c45ca9b13fc4b0a5c80b896e219ff376eb49d2ab9d3e2ddaa7a2e743e97289']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a6c66b4a-943b-4095-89fe-af13049c2857", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:55.000Z", "modified": "2018-03-13T13:51:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/43c45ca9b13fc4b0a5c80b896e219ff376eb49d2ab9d3e2ddaa7a2e743e97289/analysis/1520438328/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d77b-a738-4998-a998-420602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d77b-c378-48ca-be69-4a0a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:58:48", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d77b-30a8-47e5-a8bc-407402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--627d360a-1b2e-450b-8fba-76deceb75528", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:59.000Z", "modified": "2018-03-13T13:51:59.000Z", "pattern": "[file:hashes.MD5 = 'd7d228cb41b18b621ffa2ca3275d11b8' AND file:hashes.SHA1 = '50182a063f53e2cf1c6b35cfaaaaab16c3ee8e9c' AND file:hashes.SHA256 = '64f64e84b753992054214453ffc55f0b04f8e424d2b7610dc134c75f7da899ee']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:51:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--04de7a55-7030-479a-9a54-1b3b5857a7cf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:57.000Z", "modified": "2018-03-13T13:51:57.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/64f64e84b753992054214453ffc55f0b04f8e424d2b7610dc134c75f7da899ee/analysis/1520855880/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d77d-80e0-4367-952b-486202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d77e-4e98-48a0-be4f-445602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 11:58:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d77e-6900-4ea6-9fff-41e902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d34ba1e1-ea64-48da-8df2-4ac0c83d2174", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:01.000Z", "modified": "2018-03-13T13:52:01.000Z", "pattern": "[file:hashes.MD5 = '136c2578fdd33600a0a41f4e4f52ab9c' AND file:hashes.SHA1 = '4b5f0137640677356f0a93d09dde53ef7b9afd3c' AND file:hashes.SHA256 = 'b16db20a9a2e19b318d0ecfd8e9253e16499d8498156bcad684c39a9b3c37c4e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--64bec757-4f02-4661-be85-d133f1f916f4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:51:59.000Z", "modified": "2018-03-13T13:51:59.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b16db20a9a2e19b318d0ecfd8e9253e16499d8498156bcad684c39a9b3c37c4e/analysis/1520446237/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d77f-7d48-494b-afd7-412f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d780-662c-49b3-9354-4a3302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 18:10:37", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d780-cbf0-4799-b407-4d9902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--95d5d4b0-6b7d-4606-aad5-deffead81484", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:03.000Z", "modified": "2018-03-13T13:52:03.000Z", "pattern": "[file:hashes.MD5 = '5f939d4c3cf1d668b0b9f74658659929' AND file:hashes.SHA1 = '72aff0a2268ae11aebf81e75ddf365ffd6cb6f99' AND file:hashes.SHA256 = '25708004887ea068f449e989bbbec07282d14c3ddd8cd03b4af492143a03f397']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8c3771ce-366b-4cfb-be18-490fef4a77e3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:02.000Z", "modified": "2018-03-13T13:52:02.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/25708004887ea068f449e989bbbec07282d14c3ddd8cd03b4af492143a03f397/analysis/1520376422/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d782-e754-4302-8ac9-47c302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d782-074c-4f66-bdf3-4a3b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:02", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d782-bee4-4dfd-9cdc-455602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7e2b3829-7e79-4457-8c46-52cc0a4c135b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:06.000Z", "modified": "2018-03-13T13:52:06.000Z", "pattern": "[file:hashes.MD5 = '9d095bfe4e4de6a0ff97f683fb3355f1' AND file:hashes.SHA1 = '13e758afee7ee7fabbdb5191a3b699508a91e388' AND file:hashes.SHA256 = 'c39babff09e33d20d0d24c0ff68810aa593a22fd53f5da287991a7373446a8da']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7cfdff1a-969b-4132-81e2-91db2d53b935", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:04.000Z", "modified": "2018-03-13T13:52:04.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/c39babff09e33d20d0d24c0ff68810aa593a22fd53f5da287991a7373446a8da/analysis/1511497778/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d784-9080-4298-8a51-4d0b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d785-ee3c-4c92-af47-412102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-24 04:29:38", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d785-c490-43d7-8418-46a402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6b7e96a4-c224-4cd4-9463-0a4abfe1310c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:08.000Z", "modified": "2018-03-13T13:52:08.000Z", "pattern": "[file:hashes.MD5 = 'f2e43e556ec1d89e283cd22af4d3fca9' AND file:hashes.SHA1 = '5f42072c970484a09da377c8bb3b2b651ba1696a' AND file:hashes.SHA256 = 'aeb1e902075da6dc2d2526751276cc6602c819bbea2e668e9dc3baaf9d177adc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6d78971f-8ac5-459a-8e28-61152f4387f6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:06.000Z", "modified": "2018-03-13T13:52:06.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/aeb1e902075da6dc2d2526751276cc6602c819bbea2e668e9dc3baaf9d177adc/analysis/1520440471/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d786-90a0-401b-9c0b-470002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d787-f67c-4005-bf8e-472402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:34:31", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d787-f1f8-45be-8dcd-499302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6d443c89-c0fb-498b-b29c-f70a8e9b7441", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:10.000Z", "modified": "2018-03-13T13:52:10.000Z", "pattern": "[file:hashes.MD5 = '1b53dea2ba172b642f97cb46e3887cf0' AND file:hashes.SHA1 = '8ab18026388691d5c8a71213e565e0a62ec93739' AND file:hashes.SHA256 = '8587dda211ef94435a1ef9f1c4c299afacc179fd59fe06c74d3e75506d084277']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f7e1ca9a-c724-4270-b711-d7311d1bf670", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:09.000Z", "modified": "2018-03-13T13:52:09.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8587dda211ef94435a1ef9f1c4c299afacc179fd59fe06c74d3e75506d084277/analysis/1520439611/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d789-3454-4bf0-a2ac-409702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d789-a4b0-4c87-80da-4cbd02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:20:11", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d789-2f00-4d8f-abb7-4c1602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8bed1326-1a1d-4928-8b15-a0b7ca1ee902", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:13.000Z", "modified": "2018-03-13T13:52:13.000Z", "pattern": "[file:hashes.MD5 = '0b5a3846890ffa967046bfba4a0d9426' AND file:hashes.SHA1 = 'e39fc468f9f4a5c2c0ba6e8ecf31c3700d7b3d37' AND file:hashes.SHA256 = '82b4da37d492b024b190fbbe30dc08b1d9b877f20fbce057ad1b1c0566421994']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--49292793-cd90-46f5-826e-83edb402829d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:11.000Z", "modified": "2018-03-13T13:52:11.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/82b4da37d492b024b190fbbe30dc08b1d9b877f20fbce057ad1b1c0566421994/analysis/1513719622/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d78b-23ec-4db2-b0f2-410c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "43/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d78b-367c-4990-bce0-42ef02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-19 21:40:22", "category": "Other", "comment": "Executable File", "uuid": "5aa7d78b-9718-42b5-914e-4b5202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d1bc2cce-a622-49f4-aeb8-5b953ef057bd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:15.000Z", "modified": "2018-03-13T13:52:15.000Z", "pattern": "[file:hashes.MD5 = '76f9e428cef62823b24fef1027b0e1a1' AND file:hashes.SHA1 = 'b86f5bc56ec349271819792a85b4f906d7a6c5da' AND file:hashes.SHA256 = 'b930d8c294a10f76e7dc9fbe1b257142fa5abc4bea0bc51ef544117b4ad51e29']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--320498fb-361d-4be2-bf24-c44442ba1d43", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:13.000Z", "modified": "2018-03-13T13:52:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b930d8c294a10f76e7dc9fbe1b257142fa5abc4bea0bc51ef544117b4ad51e29/analysis/1520440735/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d78d-4ae0-478f-bc50-46d502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d78e-2ad0-4883-ac82-4e5502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:38:55", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d78e-0c3c-45e3-b8ce-40d602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--139c2340-d819-4e2a-b7ef-5db4b5456996", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:17.000Z", "modified": "2018-03-13T13:52:17.000Z", "pattern": "[file:hashes.MD5 = 'ac0067988b2c79c6981a9ba4f4c329f1' AND file:hashes.SHA1 = '32166fa4012c0ef3fe6028e30a12630a9974c5a4' AND file:hashes.SHA256 = 'f8002689fec2703e5560634aeaa89fabd96fba28316d31a41bf975f14ad1dfa6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--11fc4165-9256-452c-bd57-91eea67d52f7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:16.000Z", "modified": "2018-03-13T13:52:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f8002689fec2703e5560634aeaa89fabd96fba28316d31a41bf975f14ad1dfa6/analysis/1520855340/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d790-fd6c-46ff-9b5a-4c3b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d790-599c-489d-bf66-459102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 11:49:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d790-63a0-44a6-82dd-42e402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9a4100e0-80fa-4c58-8ea4-c72ae84eabea", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:20.000Z", "modified": "2018-03-13T13:52:20.000Z", "pattern": "[file:hashes.MD5 = '741db18df23a7ae363be11bc3dbc8d67' AND file:hashes.SHA1 = '7e5cad51c1c13d97204b820575f4d292af494b68' AND file:hashes.SHA256 = '897b2f0c72cc89596f02d1d496578791677f61c4f1ef71aa2e784746479095bd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--529f731b-28af-4b92-a2e5-02df29872815", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:18.000Z", "modified": "2018-03-13T13:52:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/897b2f0c72cc89596f02d1d496578791677f61c4f1ef71aa2e784746479095bd/analysis/1520912416/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d792-a250-47b9-8c96-401702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d792-c528-4edd-a23b-472402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:40:16", "category": "Other", "comment": "Executable File", "uuid": "5aa7d792-d14c-4022-9516-4dd002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--136020bc-9d22-4ff9-8ecc-0593daa5cdc9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:22.000Z", "modified": "2018-03-13T13:52:22.000Z", "pattern": "[file:hashes.MD5 = 'cbbd9de8c1f52ee1f167a28a85623f4e' AND file:hashes.SHA1 = '0fd93fe0d0a56d293c29e52ba32d62ace7d67944' AND file:hashes.SHA256 = 'f1b2aad1a13527a4a420bf395f9aef9be0e024867ec07e7bb4ef142a5adaf1c9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a0368a1c-1331-48d8-be77-72246033e74d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:20.000Z", "modified": "2018-03-13T13:52:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f1b2aad1a13527a4a420bf395f9aef9be0e024867ec07e7bb4ef142a5adaf1c9/analysis/1510538879/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d794-be7c-4f26-b159-48d002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d795-cee8-4d67-aeb5-4e8402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-13 02:07:59", "category": "Other", "comment": "Executable File", "uuid": "5aa7d795-9538-4cd1-b57a-424102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--df75d959-0373-4dcb-9d03-661b2e89367d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:24.000Z", "modified": "2018-03-13T13:52:24.000Z", "pattern": "[file:hashes.MD5 = '3974f65ad10cb0f98f88cbefccb12d6a' AND file:hashes.SHA1 = '44bcaaeda395e40e9b8a2f6654268d8a781d19fc' AND file:hashes.SHA256 = 'e192c87072de321abd224a30c571207d986b882ec662da9c4ddf1b83d407eaa7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--dd4de532-cdff-43db-9b08-383978d10ecf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:22.000Z", "modified": "2018-03-13T13:52:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e192c87072de321abd224a30c571207d986b882ec662da9c4ddf1b83d407eaa7/analysis/1515020267/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d796-8c00-481a-ae64-468802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "25/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d797-7204-438e-b905-45ce02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 22:57:47", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d797-8f78-419c-832d-4e5b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7cf04113-a5ef-4039-a3e1-ffe4ec7290a3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:26.000Z", "modified": "2018-03-13T13:52:26.000Z", "pattern": "[file:hashes.MD5 = '1157a7a75d7d16ed2aeb80e631d4f33a' AND file:hashes.SHA1 = '21714237b26c5002491c082928563c9a17d44100' AND file:hashes.SHA256 = 'a7b9ddd84fc86c1eb09feba86b773961cc1d459287eae364bbe750533ac5ceb9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b9d2a895-a418-495d-a507-6ed53e60da61", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:25.000Z", "modified": "2018-03-13T13:52:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a7b9ddd84fc86c1eb09feba86b773961cc1d459287eae364bbe750533ac5ceb9/analysis/1520376463/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d799-b18c-47f1-9409-4ad402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d799-a0d4-4ca6-b418-49eb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:43", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d799-4634-4823-a3dd-4a0302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2921db48-769c-4001-86d0-7f439fd5895a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:29.000Z", "modified": "2018-03-13T13:52:29.000Z", "pattern": "[file:hashes.MD5 = '686c3aefcf126467b8c45beaf689cf50' AND file:hashes.SHA1 = '2819c5bc755a2af4eb682d669d15895347f0f246' AND file:hashes.SHA256 = '45fad51e141ab93a26df72010aab0c464da2979745b62066a5810e7b5dc370e1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--744bd821-f292-4972-a1c0-9ef1cb1501d8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:27.000Z", "modified": "2018-03-13T13:52:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/45fad51e141ab93a26df72010aab0c464da2979745b62066a5810e7b5dc370e1/analysis/1520911140/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d79b-5be8-455f-b45d-4d7c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d79c-7a44-4c16-9ee4-4e3d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:19:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d79c-7458-42a1-b0af-4bb102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3b4dddf3-912b-4a36-a71e-036980f6e913", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:31.000Z", "modified": "2018-03-13T13:52:31.000Z", "pattern": "[file:hashes.MD5 = 'f7995ceb2d17d635986fb76ba59fd122' AND file:hashes.SHA1 = '5e6ca17818ed8893b2e1098126fdc6821e2b2089' AND file:hashes.SHA256 = 'f144d58388ad6137c62581987da8dbb558e347670d79521898fb2b3084372963']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:31Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7f3cc856-802d-426c-8c22-246dc019e2cb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:29.000Z", "modified": "2018-03-13T13:52:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f144d58388ad6137c62581987da8dbb558e347670d79521898fb2b3084372963/analysis/1520903580/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d79e-e9e4-4d3b-b249-4e0c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d79e-74ac-49fb-a3b7-438302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 01:13:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d79e-bf98-41f1-837e-477902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e12bb0ee-a69a-4146-b055-56ca6d2cc0fc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:33.000Z", "modified": "2018-03-13T13:52:33.000Z", "pattern": "[file:hashes.MD5 = 'a3b605efefd8266d7e8d1051314604d9' AND file:hashes.SHA1 = '2bfd136652ed987c5b04d6a7295ed61bbfe39553' AND file:hashes.SHA256 = 'a6a8204b0fe9a34ec7c41a60a54a0d4af1d34d0bbda89c0828092a7a11226f0a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9489f5d2-ff71-4fd0-815d-78330163a252", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:32.000Z", "modified": "2018-03-13T13:52:32.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a6a8204b0fe9a34ec7c41a60a54a0d4af1d34d0bbda89c0828092a7a11226f0a/analysis/1508031785/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7a0-e78c-42dc-8326-49cd02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7a0-ca94-40dc-8ee8-4a0902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-10-15 01:43:05", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7a0-bcd4-4274-98f4-436b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2176c24c-867e-4722-a4f3-93baf925f23b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:36.000Z", "modified": "2018-03-13T13:52:36.000Z", "pattern": "[file:hashes.MD5 = '939766d8b2c4b0110018d5b07661c518' AND file:hashes.SHA1 = '942ccb6006213f6ae488b3388662289ff9f645bb' AND file:hashes.SHA256 = '437f7e76026b069fd1a25f633f250418792c77e94f77cc2bb7b6d03b897b17b0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--01a3a067-3cd9-4ad4-9d0d-edcfaeff95e9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:34.000Z", "modified": "2018-03-13T13:52:34.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/437f7e76026b069fd1a25f633f250418792c77e94f77cc2bb7b6d03b897b17b0/analysis/1516118226/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7a2-9de8-4112-acf6-410c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7a2-57d0-4512-bf61-43b002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-16 15:57:06", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7a2-5aac-4103-8274-41ff02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d99541c3-21f9-4e43-a072-f9f348acc61a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:38.000Z", "modified": "2018-03-13T13:52:38.000Z", "pattern": "[file:hashes.MD5 = '4c2b9f101e22a2908a81d8a7e0ac128d' AND file:hashes.SHA1 = '307d39be99b0046a24b10251cbed980695810886' AND file:hashes.SHA256 = '36ded192ad393efe6ede239ec44f3f92457ff3647a1c3f87eabc859db52c9575']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--004be45d-0741-4968-86ee-422470e10454", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:36.000Z", "modified": "2018-03-13T13:52:36.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/36ded192ad393efe6ede239ec44f3f92457ff3647a1c3f87eabc859db52c9575/analysis/1520376512/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7a5-a3c0-4705-a3e3-444a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7a5-883c-472a-b038-46ac02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:32", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7a5-12ec-48e2-9d31-4cac02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d3259046-b495-487a-ba1b-213849af711b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:40.000Z", "modified": "2018-03-13T13:52:40.000Z", "pattern": "[file:hashes.MD5 = 'ef728ac92c9ab82f429b44af2b72446e' AND file:hashes.SHA1 = 'fe7a1fd692a86cda7bea9d8f59294c60318a70fb' AND file:hashes.SHA256 = '07d9637fff6a7974be99206e6b767653e3ceef2bd91531afa300e1430b8eb800']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--84bf6f44-a6f7-4787-b77a-8aa652de24d1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:39.000Z", "modified": "2018-03-13T13:52:39.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/07d9637fff6a7974be99206e6b767653e3ceef2bd91531afa300e1430b8eb800/analysis/1520929871/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7a7-7308-474c-ae25-440502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7a7-73b4-4b0c-9b36-443002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 08:31:11", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7a7-2a7c-4f9f-81eb-4d5c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4b42b7ba-a997-4165-ba35-d68532e67774", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:43.000Z", "modified": "2018-03-13T13:52:43.000Z", "pattern": "[file:hashes.MD5 = '34138fc961bc84b3034d3cdff7983bba' AND file:hashes.SHA1 = '49a63665523c2c7e7e2e7e3709b7800cf251357f' AND file:hashes.SHA256 = '5f0028ccf2b04dc60b8589a1f66dfe0dd066bd6ee5a6b6dd2cda57e42270ef54']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--17a3fa4e-9caa-4187-a01f-829a2a81b273", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:41.000Z", "modified": "2018-03-13T13:52:41.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5f0028ccf2b04dc60b8589a1f66dfe0dd066bd6ee5a6b6dd2cda57e42270ef54/analysis/1520438834/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7a9-bb18-4e22-a256-44f002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "27/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7aa-ba30-4914-9016-4d6402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:07:14", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7aa-5d44-4074-b3db-437202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--af041428-4279-46bf-93f7-95a9ae7e9ac0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:45.000Z", "modified": "2018-03-13T13:52:45.000Z", "pattern": "[file:hashes.MD5 = '340f57477a1e9b238ecc22ae4bb60b4f' AND file:hashes.SHA1 = 'c9d4dadcd7f6851d0a249274530ee09808f7b9c2' AND file:hashes.SHA256 = 'ed16e269224b7daeb5fb8aa5194543c3b300d5e9e916f1c00e268747c676247c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:45Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a4eaa802-abe1-41ad-8dd3-d0ce3294cb7d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:43.000Z", "modified": "2018-03-13T13:52:43.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ed16e269224b7daeb5fb8aa5194543c3b300d5e9e916f1c00e268747c676247c/analysis/1520376489/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7ac-a7e8-4b66-a134-443202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ac-704c-45ae-9fdf-491402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:09", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ac-ce30-4def-b11c-48aa02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--908010cd-28a0-4f08-a7a5-69281f864864", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:47.000Z", "modified": "2018-03-13T13:52:47.000Z", "pattern": "[file:hashes.MD5 = '07758b5ba4102f22c1c33c29d46ab896' AND file:hashes.SHA1 = 'd453bcc4be23a3d93253c1a060fb426cbcf42e10' AND file:hashes.SHA256 = '12596ccb9a77db49e5dd8c2b38779cdea41f78660c8a0b9d0ccd80bef004b2b6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d989e4a7-23b0-46e7-813f-00cdf793e023", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:46.000Z", "modified": "2018-03-13T13:52:46.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/12596ccb9a77db49e5dd8c2b38779cdea41f78660c8a0b9d0ccd80bef004b2b6/analysis/1517233278/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7ae-55e8-4da1-8d61-49a002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ae-6690-4139-b056-4b2e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-29 13:41:18", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ae-f11c-4ffb-862d-404602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2df4ad14-cdee-402f-9b29-66314a34cfca", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:50.000Z", "modified": "2018-03-13T13:52:50.000Z", "pattern": "[file:hashes.MD5 = '22f5fc8c3b6d038df86bc8021f1de668' AND file:hashes.SHA1 = '4d32519479e1d66b2939a6ddb22faf22bae19a48' AND file:hashes.SHA256 = '1f14d6590c2f3434805d0967ba7bbb822ce7ec39a89b9b10f2a26d11176cc77a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ae6eff32-1af2-4531-9939-8eefe6ee25dd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:48.000Z", "modified": "2018-03-13T13:52:48.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/1f14d6590c2f3434805d0967ba7bbb822ce7ec39a89b9b10f2a26d11176cc77a/analysis/1520437631/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7b0-7a94-4f3f-a2a6-450b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7b0-03f8-4b7b-a87d-482302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:47:11", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7b0-c4d0-46b8-b133-406402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4ebe1cd8-46c9-4f31-a5df-525f4d91d446", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:52.000Z", "modified": "2018-03-13T13:52:52.000Z", "pattern": "[file:hashes.MD5 = '42ee3f01f1b974afddfff585e9954d63' AND file:hashes.SHA1 = '5657e0ed23b7e9c661a545d7c9e20d0fffae1129' AND file:hashes.SHA256 = '8911699cdd4ced8731dd4b0f5269f52073acab270bad78aa4d161aaa673e63f9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1c2bcd49-2485-4949-a704-8b12e30d65e3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:50.000Z", "modified": "2018-03-13T13:52:50.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8911699cdd4ced8731dd4b0f5269f52073acab270bad78aa4d161aaa673e63f9/analysis/1520439719/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7b2-b0f0-4782-92bd-4ef802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7b3-b08c-4549-a9e1-490602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:21:59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7b3-7c58-41b1-ae83-444802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b0da95dc-a85b-498e-a0f0-679b8220ab3e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:54.000Z", "modified": "2018-03-13T13:52:54.000Z", "pattern": "[file:hashes.MD5 = '2962f9004b0de4c60e5d7f0019488649' AND file:hashes.SHA1 = 'bd5dc9a4ccdd955f9fd887e61b79119db650c414' AND file:hashes.SHA256 = '71b283a465e11cc51c5e6c2358c146ee2263c79c602efd12433e7abcab5d8934']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--11c2e221-8fef-48d6-a2d4-9699d52ca330", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:52.000Z", "modified": "2018-03-13T13:52:52.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/71b283a465e11cc51c5e6c2358c146ee2263c79c602efd12433e7abcab5d8934/analysis/1520439163/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7b5-7e94-422a-9919-454202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7b5-8af0-4cb4-8505-4e3d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:12:43", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7b5-3a14-4afa-a21e-44cb02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fac77102-1466-4b49-af45-0081aa168519", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:56.000Z", "modified": "2018-03-13T13:52:56.000Z", "pattern": "[file:hashes.MD5 = '361549029a91a9f00941115ab2ccc67f' AND file:hashes.SHA1 = '6b97abb22007c1ba7141df23e189aa2f74b346eb' AND file:hashes.SHA256 = '058f5a5091489fee86a000a55181e44d4acb5adc81bf709e506c972776cc76ca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b430aab1-6ef2-4ec5-9720-0805c1640c39", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:55.000Z", "modified": "2018-03-13T13:52:55.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/058f5a5091489fee86a000a55181e44d4acb5adc81bf709e506c972776cc76ca/analysis/1510365723/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7b7-8230-40e9-92b0-45d002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7b7-e0c4-4bf2-b601-4fbe02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-11-11 02:02:03", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7b7-3560-4a98-9d59-49a902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--45b7e720-e0f0-4621-89a8-be81720d360f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:59.000Z", "modified": "2018-03-13T13:52:59.000Z", "pattern": "[file:hashes.MD5 = '80d16601be5d34b4180407f32c3ec306' AND file:hashes.SHA1 = '7a865cc51a5a211d6c6ff49ca4fb9c69fbc94ba1' AND file:hashes.SHA256 = '519355607d92f31136d21b8ac11a2927e850de7b757af62c27e28de1ce4c1c44']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:52:59Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2e00b881-7805-493f-9af6-3dd03df10987", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:57.000Z", "modified": "2018-03-13T13:52:57.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/519355607d92f31136d21b8ac11a2927e850de7b757af62c27e28de1ce4c1c44/analysis/1520376439/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7b9-d8a8-4e6e-9262-4eb302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ba-f3d8-4996-8268-446b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:19", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ba-f27c-4f43-95c6-48aa02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3f8e9ff9-7ad7-4167-acc0-a2ceffd681c1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:01.000Z", "modified": "2018-03-13T13:53:01.000Z", "pattern": "[file:hashes.MD5 = 'f52b55229551306c01ea94ac50d88811' AND file:hashes.SHA1 = 'f426558eb3cb96f1bc0bec0924d2cf5920022aee' AND file:hashes.SHA256 = '628460a30534d48bd4e09d9ed2e524eb30f15dda804618bef73b28f8e6a33eda']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b44e8fc7-c3df-4948-8559-55c3cfa79ffd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:52:59.000Z", "modified": "2018-03-13T13:52:59.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/628460a30534d48bd4e09d9ed2e524eb30f15dda804618bef73b28f8e6a33eda/analysis/1520438947/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7bb-1bb8-4647-b8f5-43a902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7bc-8f5c-447a-aede-4e2802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:09:07", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7bc-23a8-4682-8977-4d0602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d2507aa9-43ee-4889-aef0-76757a8cbd64", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:04.000Z", "modified": "2018-03-13T13:53:04.000Z", "pattern": "[file:hashes.MD5 = '99dbcaf9091c5a43b5584ddb1a2db45c' AND file:hashes.SHA1 = '7aa59679874aa03e6ea245ee4dce240081c30289' AND file:hashes.SHA256 = '0a7c4d325455d706c3f331b595c1261e78bf59ed0c0111365604203322b1e177']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--dec03b16-27e2-4093-ab38-a00a27bc5a16", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:02.000Z", "modified": "2018-03-13T13:53:02.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0a7c4d325455d706c3f331b595c1261e78bf59ed0c0111365604203322b1e177/analysis/1520376416/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7be-7f88-4d35-81e3-438802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7be-7bc4-4a99-a3e4-4fcc02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:46:56", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7be-3c9c-420b-9b3c-489d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0de0053d-c9e3-4ca6-90ef-f56a945de1d7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:06.000Z", "modified": "2018-03-13T13:53:06.000Z", "pattern": "[file:hashes.MD5 = '1f4e78e61b73d2b8a6c0aed9cadf5693' AND file:hashes.SHA1 = 'f302c09cfe131886240d03ee488033210cf28f35' AND file:hashes.SHA256 = '4e3570696f61c6fb49f9a5e4041c9552f84ad2954649f91e5e191457049e776d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--49283bd7-ffd4-4c00-acad-f7b0e61e4a15", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:04.000Z", "modified": "2018-03-13T13:53:04.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4e3570696f61c6fb49f9a5e4041c9552f84ad2954649f91e5e191457049e776d/analysis/1520376436/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7c0-3840-4e3c-9dc7-4ea002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7c1-38c0-4f26-b601-47d402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:16", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7c1-75e4-4fb7-8d84-476d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f188e92b-8a5f-4399-b9c9-e745b9398888", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:08.000Z", "modified": "2018-03-13T13:53:08.000Z", "pattern": "[file:hashes.MD5 = '48866b1db2139cef3b7d323a44edf046' AND file:hashes.SHA1 = '2aaed5242da7da753b41d8285032101880cd34ab' AND file:hashes.SHA256 = 'f851b6fceaaa704f2efc94db26599c64f0b9c99dbb130ee2ad14c598c245ec11']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f3765bba-c4df-4ada-9640-73b6b56bdcd0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:06.000Z", "modified": "2018-03-13T13:53:06.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f851b6fceaaa704f2efc94db26599c64f0b9c99dbb130ee2ad14c598c245ec11/analysis/1461595674/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7c2-498c-4a67-bd08-401c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/57", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7c3-f9d8-4a27-92b8-447c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2016-04-25 14:47:54", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7c3-cf6c-4f50-a896-4ce902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ee9122b3-2621-4f5d-8f22-6936733b76a2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:11.000Z", "modified": "2018-03-13T13:53:11.000Z", "pattern": "[file:hashes.MD5 = 'ffb4c83fa263b8a76f8b997f7a1ecffd' AND file:hashes.SHA1 = '3ea8a8ecdaad54f289203358f82a7a86dcee1649' AND file:hashes.SHA256 = '134692b2f723e62bf9cb243e69bc7d4fc613ecccd02d44072e6097ebdf34ce8e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--66faec5c-f35f-4310-ae76-b5d133c3d514", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:09.000Z", "modified": "2018-03-13T13:53:09.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/134692b2f723e62bf9cb243e69bc7d4fc613ecccd02d44072e6097ebdf34ce8e/analysis/1520437498/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7c5-1510-42ae-ae17-413202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7c6-18f0-4b26-98c1-46dd02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:44:58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7c6-f9d0-4c4b-9515-407602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5d5cff29-0013-4f58-a217-5ffc70a9b467", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:13.000Z", "modified": "2018-03-13T13:53:13.000Z", "pattern": "[file:hashes.MD5 = 'd4e544d40ab16b67958c53c0a5ff3d8f' AND file:hashes.SHA1 = '4c2167f980a91a58a06832df2e9e2c9b1427cf28' AND file:hashes.SHA256 = '47d573c96a36966d4074d77855d64cdf8b977e6cae63c232cc477e622c60adec']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8ba5aae0-fca0-4615-a91c-db32cf0e838c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:12.000Z", "modified": "2018-03-13T13:53:12.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/47d573c96a36966d4074d77855d64cdf8b977e6cae63c232cc477e622c60adec/analysis/1520910600/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7c8-ec18-44f9-9907-429c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7c8-777c-46ee-9924-4cd002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:10:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7c9-e8c0-4aca-99c2-4a2402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d5de0f3b-09de-463d-85b3-3348fc8a6331", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:16.000Z", "modified": "2018-03-13T13:53:16.000Z", "pattern": "[file:hashes.MD5 = '612f9e6f473c2faf993a08db5b9fe9bb' AND file:hashes.SHA1 = '70536076b4096ec46438ad3d20d001d50fa5701e' AND file:hashes.SHA256 = '1252053029722400e9f8115ad0b33235c642fbc7bbb96cf0c0d02c51d3426ae0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2c00b6d5-4b71-4749-8627-c2f99359e324", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:15.000Z", "modified": "2018-03-13T13:53:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/1252053029722400e9f8115ad0b33235c642fbc7bbb96cf0c0d02c51d3426ae0/analysis/1520867460/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7cb-72d0-4e3d-9793-420b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "53/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7cc-f7d0-40af-b152-43f702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 15:11:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7cc-dae4-4674-8ac5-4b7002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9e409b3a-5452-4c05-bdb6-83a7b07e379e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:19.000Z", "modified": "2018-03-13T13:53:19.000Z", "pattern": "[file:hashes.MD5 = '2b69e28a11c18181c7f0532119bd9fdb' AND file:hashes.SHA1 = 'c8785540b553f6d5412516583c9d15f40047c4f4' AND file:hashes.SHA256 = '6cf02af30b8a304b565da539a6222033a6240a33aba013105a44dd77e0508faf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ceebf3aa-a6a1-42f9-b4d7-bc07e1c353fe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:17.000Z", "modified": "2018-03-13T13:53:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/6cf02af30b8a304b565da539a6222033a6240a33aba013105a44dd77e0508faf/analysis/1520376523/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7cd-4ce4-4e33-b61e-42ee02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7ce-35ec-4e62-b275-46df02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:43", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7ce-1068-4189-8c43-47a002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a0a7273f-3c33-4691-8ebe-3ce2b0d33c72", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:21.000Z", "modified": "2018-03-13T13:53:21.000Z", "pattern": "[file:hashes.MD5 = 'aafba3f73a1061835efc192851b52512' AND file:hashes.SHA1 = '48c8f240ec3324280eb7cf329b82c2a66022f5a4' AND file:hashes.SHA256 = '194845f61ff81aa9000b3df9f0513b737941c1eac444b5457bcb9a0f772f8b34']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b8e6eadf-5c37-4201-9195-f248b9a9ea9c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:20.000Z", "modified": "2018-03-13T13:53:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/194845f61ff81aa9000b3df9f0513b737941c1eac444b5457bcb9a0f772f8b34/analysis/1516831571/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7d0-4d4c-488a-9c6a-460302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7d0-0570-4869-b0b2-448b02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-24 22:06:11", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7d0-8bb8-4c17-af7d-4df302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--43c21a39-d823-44b8-831b-c36317700f44", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:23.000Z", "modified": "2018-03-13T13:53:23.000Z", "pattern": "[file:hashes.MD5 = '4ddb841ce0b99075668e22674716c8d4' AND file:hashes.SHA1 = 'd049a2c4cbdcf5f742b012fdd24e81078878d197' AND file:hashes.SHA256 = 'e7d93e7f5cf85d8daa275fe73346930fe70233d553bd1d509cb7c2008abd3c7e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6186ed82-e296-4016-b6ca-b6fefd19587e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:22.000Z", "modified": "2018-03-13T13:53:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e7d93e7f5cf85d8daa275fe73346930fe70233d553bd1d509cb7c2008abd3c7e/analysis/1520445947/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7d2-4fa0-484c-8421-425302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/58", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7d2-3544-4733-b22e-445d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 18:05:47", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7d3-999c-442c-8cec-473c02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b1fe42d9-2519-44d7-b1a6-87056aa9ec7e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:26.000Z", "modified": "2018-03-13T13:53:26.000Z", "pattern": "[file:hashes.MD5 = 'b25de1c21f1340ae9cf99133f80d11ec' AND file:hashes.SHA1 = '7b20a9cd0af5977488c32182bfd0116879214521' AND file:hashes.SHA256 = '949e42af2d12099f743d9c83dccaa01885ecf9f3bc40a99a9a868a7dc3e7f367']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f994c47c-ea40-412b-8854-d748ec104625", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:24.000Z", "modified": "2018-03-13T13:53:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/949e42af2d12099f743d9c83dccaa01885ecf9f3bc40a99a9a868a7dc3e7f367/analysis/1520322156/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7d4-2af8-4798-8f54-486a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7d5-0894-4f14-a47b-4d5102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 07:42:36", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7d5-599c-46f7-8c6e-482d02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--399781fe-7ce3-48d4-836f-35080235fe53", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:28.000Z", "modified": "2018-03-13T13:53:28.000Z", "pattern": "[file:hashes.MD5 = '6693e904fdd23b36f443613cba5735a6' AND file:hashes.SHA1 = '574c0bf112d0d15a6579652c01ca0c1c39d93424' AND file:hashes.SHA256 = 'e9fe7ebd22877358cc0f02c233faeaf4c40cf057a3c9fe5ba0a53ff3d9765f4b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f08dfd7d-fe11-49fb-b4aa-29990ca09262", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:27.000Z", "modified": "2018-03-13T13:53:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e9fe7ebd22877358cc0f02c233faeaf4c40cf057a3c9fe5ba0a53ff3d9765f4b/analysis/1520440998/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7d7-c6ac-44d8-b915-429202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7d7-2278-4f93-8525-40b502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:43:18", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7d7-5aa0-4647-9c9c-488502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a8903b85-2d3f-4c0a-a072-de47670e4c51", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:30.000Z", "modified": "2018-03-13T13:53:30.000Z", "pattern": "[file:hashes.MD5 = '61e42d0657d0b8bb02546f9fff9f101d' AND file:hashes.SHA1 = 'ad1ac5e7a49be2e2ade8d3d2e94dc6a0e5a1ff54' AND file:hashes.SHA256 = 'ce316a440ed198eb286f01f6c18297f8207d7ee56c5fe0f415a2bb43558e4117']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:30Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6336762e-38ab-431d-892c-11eb2ca40cae", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:29.000Z", "modified": "2018-03-13T13:53:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ce316a440ed198eb286f01f6c18297f8207d7ee56c5fe0f415a2bb43558e4117/analysis/1514420985/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7d9-0d60-474a-86bc-4c7002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7d9-b054-461b-9cba-410202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-28 00:29:45", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7d9-cc0c-4050-8b00-4eb502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ca64f9b1-2a0a-4762-8f9e-65670a29d957", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:33.000Z", "modified": "2018-03-13T13:53:33.000Z", "pattern": "[file:hashes.MD5 = 'bf7ae49f1fc377ec1114aacdf704a966' AND file:hashes.SHA1 = '6925c1f7e74e549cb15527a2756eaf6b0ac9a1a2' AND file:hashes.SHA256 = '87fbf04b07fcbdd2f97f1f51d99abd19f1572f33f8253be8d79152c9b6d00aa7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:33Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c15a3bf5-7ff8-4325-af1b-f8cfc5ba01d2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:31.000Z", "modified": "2018-03-13T13:53:31.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/87fbf04b07fcbdd2f97f1f51d99abd19f1572f33f8253be8d79152c9b6d00aa7/analysis/1520488522/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7db-ac24-4f14-ab25-493a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7db-94dc-496b-b6d0-48f102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:55:22", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7db-1d64-48b1-bc52-4e2502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--10f161a8-d5a3-4e19-8ba6-31e105782123", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:35.000Z", "modified": "2018-03-13T13:53:35.000Z", "pattern": "[file:hashes.MD5 = '6bfb69bc644a2ea5303a0f6f24744fec' AND file:hashes.SHA1 = '5c0cf042a0219bd28b5cfe20b30221e978aecb01' AND file:hashes.SHA256 = 'b67584f6baec97528656dfbff7749f7eb355497706359db0c4bd981c15b3e854']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--671f2cb9-b54e-4da9-bcb3-960d30dedcb1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:33.000Z", "modified": "2018-03-13T13:53:33.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b67584f6baec97528656dfbff7749f7eb355497706359db0c4bd981c15b3e854/analysis/1520440656/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7dd-3190-41bf-bc6d-4a2502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7de-2940-4a3b-bf78-435902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:37:36", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7de-7f64-4933-8a93-419202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--07bf697d-c098-4b87-acb7-f4634bc6638c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:37.000Z", "modified": "2018-03-13T13:53:37.000Z", "pattern": "[file:hashes.MD5 = '5e0026a0941f4e7f0d6ad2449c4135fd' AND file:hashes.SHA1 = 'bba0f803cd72554f41e72f14f8490b628d62a579' AND file:hashes.SHA256 = '001c4d2a65dc725e1d616078834e32ef5f3f42c565165493de4997ea81451d30']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4df2a5d7-3d89-4706-8ffc-c322b2069332", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:36.000Z", "modified": "2018-03-13T13:53:36.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/001c4d2a65dc725e1d616078834e32ef5f3f42c565165493de4997ea81451d30/analysis/1520532567/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7e0-b094-4e3a-b078-4f7602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7e0-aa5c-4e58-904a-402e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 18:09:27", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7e0-21b0-4ecc-b8f1-44a002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4f394327-9de3-4f16-bd7e-67ae011e2253", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:40.000Z", "modified": "2018-03-13T13:53:40.000Z", "pattern": "[file:hashes.MD5 = '9113057a19dd19b22c43fd75c41c21bd' AND file:hashes.SHA1 = 'a00f74a896838494722674dc6386a2e4c9ae1cd2' AND file:hashes.SHA256 = '3e170b6d3f4ae8a2a101dfdf1e7a0947e715992256c16087f43d268b2de7cece']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:40Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c4e37357-07eb-44fe-a2a0-dcb9ebfef7e6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:38.000Z", "modified": "2018-03-13T13:53:38.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3e170b6d3f4ae8a2a101dfdf1e7a0947e715992256c16087f43d268b2de7cece/analysis/1520905561/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7e2-78ec-45cc-8171-408002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7e3-49c0-4359-9c46-4c1502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 01:46:01", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7e3-67e8-4bd7-86f1-4fe202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3905e8e1-d889-4208-8cc5-e6f3b7f9056e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:42.000Z", "modified": "2018-03-13T13:53:42.000Z", "pattern": "[file:hashes.MD5 = '10aa085b51f6fe2342e22132730c1b2a' AND file:hashes.SHA1 = '51c5088182c93e05f08ada45357915331643076e' AND file:hashes.SHA256 = '2f10286e313d0131b6a15d943ab91f0398287159f200f1c4774a095dfb979ff8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:42Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--41093629-a5d7-493d-8c2b-f479a8fa8529", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:40.000Z", "modified": "2018-03-13T13:53:40.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/2f10286e313d0131b6a15d943ab91f0398287159f200f1c4774a095dfb979ff8/analysis/1520376510/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7e5-aeb4-4507-9b68-4a1e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7e5-a6b4-4352-9c5a-49af02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:30", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7e5-715c-4d4c-93b9-418e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--80aa0c4d-56c4-4304-86c2-8a23da2f8ce9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:44.000Z", "modified": "2018-03-13T13:53:44.000Z", "pattern": "[file:hashes.MD5 = '8cc99c96034e8ceee56d25c5be6d34cb' AND file:hashes.SHA1 = '18bed7f3557e84c93c4e7837171bc655385fcdc6' AND file:hashes.SHA256 = '956c3c0a8b57b2322cc7269e08c0ecab13772093b964f6637a28f26c087f2783']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8bcd1506-8712-4d28-9a58-ca9647175c66", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:43.000Z", "modified": "2018-03-13T13:53:43.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/956c3c0a8b57b2322cc7269e08c0ecab13772093b964f6637a28f26c087f2783/analysis/1520488301/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7e7-325c-45c1-82fa-4ab602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7e7-a8a8-4cb7-9cc9-48ee02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:51:41", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7e7-a1d4-4703-9830-475102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b5f6d323-9417-45f7-a465-2f585eda42b8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:47.000Z", "modified": "2018-03-13T13:53:47.000Z", "pattern": "[file:hashes.MD5 = 'a6196a94ed3914a3b070f2d7b944d65d' AND file:hashes.SHA1 = '9f6f5fadfc9a024865a3d27c40b347d1f9a0dc80' AND file:hashes.SHA256 = '32695d63215d0bd76887f1373b89607f6b73b193f37f044a518afe3db446bd65']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--45739206-d155-4d6b-af93-2f86cb8ac7dd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:45.000Z", "modified": "2018-03-13T13:53:45.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/32695d63215d0bd76887f1373b89607f6b73b193f37f044a518afe3db446bd65/analysis/1520911260/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7e9-5870-457a-bb12-4b3f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ea-0fe4-4c37-9738-4b8702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:21:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ea-1324-4b1e-a642-468702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9d007af0-b71c-4b34-92e6-57a09987bbe2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:49.000Z", "modified": "2018-03-13T13:53:49.000Z", "pattern": "[file:hashes.MD5 = '22e315ad3e468a0464f012308df8f9e2' AND file:hashes.SHA1 = '47bdb19d48b6f8383d0c29bfff30049894840d5d' AND file:hashes.SHA256 = '41de9e4c043450b3d2342836ed5f56217f1dd5161394d3d52811709c3584d44d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8da16671-3dec-4c2a-931d-e88fa1bdd9ee", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:48.000Z", "modified": "2018-03-13T13:53:48.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/41de9e4c043450b3d2342836ed5f56217f1dd5161394d3d52811709c3584d44d/analysis/1520376433/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7ec-359c-48f1-bdae-4ba102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ec-5988-4a24-8736-430802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:13", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ec-91ac-438b-815a-4e3f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--49b74b3b-9e5a-41c0-9cc6-1ceeaf82fe66", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:52.000Z", "modified": "2018-03-13T13:53:52.000Z", "pattern": "[file:hashes.MD5 = 'cb89c17e7d34281cb7d41eb8958727b3' AND file:hashes.SHA1 = '8dbaa869aa90a593aa7b025ca40c997867d9581d' AND file:hashes.SHA256 = '9833daa8499feb9c7fb1c6422e64904712711eb579d5196e55296cbc5a7bbbe4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:52Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3301e1c0-2d4e-4f28-944a-6c156a8eb79c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:50.000Z", "modified": "2018-03-13T13:53:50.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9833daa8499feb9c7fb1c6422e64904712711eb579d5196e55296cbc5a7bbbe4/analysis/1520376532/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d7ee-5194-443c-9b30-46f102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7ee-cb54-44aa-842e-43db02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:52", "category": "Other", "comment": "Executable File", "uuid": "5aa7d7ee-e0b0-451a-8845-4f4202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--895f0bf6-c013-48e3-8d00-7055d79eec53", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:54.000Z", "modified": "2018-03-13T13:53:54.000Z", "pattern": "[file:hashes.MD5 = '2ea689733fad037668d40b084eb39dca' AND file:hashes.SHA1 = 'a47e44d5391827efa8620330096f717260b85adb' AND file:hashes.SHA256 = '56b7d25e2ac670add082a1f563e5b6c18ac60c0883e1ca8dd1d069f443c43679']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:54Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6d232c0f-d48a-4b00-8bcc-5d72e80bcacd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:52.000Z", "modified": "2018-03-13T13:53:52.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/56b7d25e2ac670add082a1f563e5b6c18ac60c0883e1ca8dd1d069f443c43679/analysis/1520438728/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7f0-370c-42f0-829c-4f8902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7f1-cbb8-4b7e-951b-4d8502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:05:28", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7f1-3d10-4ff7-be4d-45fa02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1a3ff89e-aa94-4403-9b1f-c8b939f194f1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:56.000Z", "modified": "2018-03-13T13:53:56.000Z", "pattern": "[file:hashes.MD5 = '0544e40ba034325d686443f0cd425e3e' AND file:hashes.SHA1 = 'b2e2749428903a90861c74cf0b2ea0cf01afd1b0' AND file:hashes.SHA256 = '374595d82e93a01325099581517b4bd8f456cb7c1c651f1a3bf2c6b084e4f588']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:56Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--22395f70-e94a-43fe-a45a-d4e21ebc289f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:54.000Z", "modified": "2018-03-13T13:53:54.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/374595d82e93a01325099581517b4bd8f456cb7c1c651f1a3bf2c6b084e4f588/analysis/1520488263/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7f2-0d48-42a6-aa48-469702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7f3-ee04-4667-8e70-4d4002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:51:03", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7f3-de18-4367-9707-447202de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8d76e8fb-32e8-4b38-a540-8ab6539c1a13", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:58.000Z", "modified": "2018-03-13T13:53:58.000Z", "pattern": "[file:hashes.MD5 = '2eb34962194c741b1b5cf7319e4d31df' AND file:hashes.SHA1 = '5b2c33a879e0d74b01ce6c72e7ecff2eb822a0b9' AND file:hashes.SHA256 = 'f97576b901e8daaac28370cbbc31ed48b98cea84b64a7d83c1fc2c805bf0c672']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:53:58Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d6a57e30-b781-4431-96c7-a3922f77c64f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:57.000Z", "modified": "2018-03-13T13:53:57.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f97576b901e8daaac28370cbbc31ed48b98cea84b64a7d83c1fc2c805bf0c672/analysis/1520376496/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7f5-30dc-493b-b9af-4fe302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7f5-78e0-495d-902a-49a202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:16", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7f5-a9e8-4f43-a94d-46c902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8ddfa5e0-c492-4661-92cd-e927230d5b3d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:01.000Z", "modified": "2018-03-13T13:54:01.000Z", "pattern": "[file:hashes.MD5 = '9ada56f1ca6b96802333c50802916296' AND file:hashes.SHA1 = 'b9853aa66ed9b32f3b41475989abc86f2b149a14' AND file:hashes.SHA256 = '3234c6726f375d48cd7274e1e2aca5163ec20b8344637f67990f2ce1df587c62']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:01Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ea151dbd-2122-4785-9e0b-4adee906b295", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:53:59.000Z", "modified": "2018-03-13T13:53:59.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3234c6726f375d48cd7274e1e2aca5163ec20b8344637f67990f2ce1df587c62/analysis/1520437952/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7f7-0624-498e-bdaa-4da402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "30/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7f7-6138-4366-a2c6-41b102de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:52:32", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7f8-cccc-46dc-acaa-44ea02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--848a653a-0ff6-4b48-aa3f-ed315f673c79", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:03.000Z", "modified": "2018-03-13T13:54:03.000Z", "pattern": "[file:hashes.MD5 = '4401cbd1631656b82b5e88dbed510025' AND file:hashes.SHA1 = '5b6cc1644c53bebc41fa3a6c262625a9abbe0654' AND file:hashes.SHA256 = '3903705c0e2eb3b9d6c289257aa515c987ed06eab3051c7c68369a4a64d93ecf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--44e7f385-7e2c-419d-a1cc-9a62e0cb1be0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:01.000Z", "modified": "2018-03-13T13:54:01.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3903705c0e2eb3b9d6c289257aa515c987ed06eab3051c7c68369a4a64d93ecf/analysis/1520438222/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7f9-0dc0-41e6-b004-4ef402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7fa-b880-4758-a2eb-48d302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:57:02", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7fa-2334-4b37-8ffe-466702de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--79a94358-05a4-4a42-80fa-7449e6261551", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:05.000Z", "modified": "2018-03-13T13:54:05.000Z", "pattern": "[file:hashes.MD5 = '8281a8b8a324aa55c22363912af080ae' AND file:hashes.SHA1 = 'bb982a9b37330741202d807504224c852314e91d' AND file:hashes.SHA256 = 'c0e4aa6f57baae774b036bb5f9e9dd70a069d5ef03164c4b5e2a5825846b365e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--692fc00c-4eb6-45d1-9772-d705f620d05f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:04.000Z", "modified": "2018-03-13T13:54:04.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/c0e4aa6f57baae774b036bb5f9e9dd70a069d5ef03164c4b5e2a5825846b365e/analysis/1520488387/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7fc-d7e0-4648-9db3-446b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7fd-a2d4-4dce-ab6c-437802de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:53:07", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7fd-66e0-4c5c-8389-455f02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--de1f9e1e-cc20-4d3d-ba3d-ff289e81ea2e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:08.000Z", "modified": "2018-03-13T13:54:08.000Z", "pattern": "[file:hashes.MD5 = 'a94275946830ab4317da5d173132363d' AND file:hashes.SHA1 = 'd790c0f02c3adc3fd0926661137463066e18701d' AND file:hashes.SHA256 = '4f47e319f1ffda90d84a31c24f6eac04774cb49b0c5062614231515794df6ed7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bd207aa7-e09f-470d-81da-8745020f58d5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:06.000Z", "modified": "2018-03-13T13:54:06.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/4f47e319f1ffda90d84a31c24f6eac04774cb49b0c5062614231515794df6ed7/analysis/1520438488/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d7ff-8274-4970-8aa8-4dae02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ff-28d4-48fc-941d-449902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:01:28", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d7ff-eb68-4e09-8b53-463302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dafda082-ec7e-46ff-a7c8-41af48f58dbd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:11.000Z", "modified": "2018-03-13T13:54:11.000Z", "pattern": "[file:hashes.MD5 = '27c54c09728b2a51a82b5f965af861bc' AND file:hashes.SHA1 = '1035de730d4abadb434acf2142e7a5054ffa7373' AND file:hashes.SHA256 = '705876c51b6e6c32f3be3d54349c7892e3657535a02f28748d186aa4f3a710c9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:11Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--79f3e338-4702-4264-aa1c-c03b057e5207", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:09.000Z", "modified": "2018-03-13T13:54:09.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/705876c51b6e6c32f3be3d54349c7892e3657535a02f28748d186aa4f3a710c9/analysis/1520439107/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d801-4270-4d02-9475-488e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/57", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d802-ccec-404b-bd9c-412d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:11:47", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d802-8f18-43b2-8ba6-4ab402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--89038c85-d67e-4771-afe8-5a91d9d6edd4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:13.000Z", "modified": "2018-03-13T13:54:13.000Z", "pattern": "[file:hashes.MD5 = '051db7e12077819ba14e6ac0fb63102e' AND file:hashes.SHA1 = 'c5e582b4fda04883c2fead58c5876b30a83c04f8' AND file:hashes.SHA256 = 'b6cb8872c9c836932cc4d9fa84c217f8cdd2e840d5f1f34441d572aaccf6c844']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--36eac465-9951-41e9-ada5-3b203a4ad794", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:12.000Z", "modified": "2018-03-13T13:54:12.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b6cb8872c9c836932cc4d9fa84c217f8cdd2e840d5f1f34441d572aaccf6c844/analysis/1520376469/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d804-f8c8-45dc-9b23-468c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d804-7030-428d-83e2-47c202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:49", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d804-6b3c-4293-b420-408902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dcca29bf-3545-4c53-8410-5f92da6d4820", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:16.000Z", "modified": "2018-03-13T13:54:16.000Z", "pattern": "[file:hashes.MD5 = '6b7ece0b260ddec3e64068c13617f95c' AND file:hashes.SHA1 = '11bb73ffb5940860c1374a0331a3db3b8ce39e6a' AND file:hashes.SHA256 = '21474c9dc0a59c8b4a9bf9a63ce2642296c3a8bd571f013f4e0744098a46f7ca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8a9d68e7-d771-4af0-a4a6-4fb30dbfea47", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:14.000Z", "modified": "2018-03-13T13:54:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/21474c9dc0a59c8b4a9bf9a63ce2642296c3a8bd571f013f4e0744098a46f7ca/analysis/1520437684/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d806-ca98-489b-94af-4b9a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d806-37c0-4242-803e-4fc002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:48:04", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d806-87ec-4c1a-90fe-4b8402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--acb977e6-4468-4ac7-b23f-21c5f5636112", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:18.000Z", "modified": "2018-03-13T13:54:18.000Z", "pattern": "[file:hashes.MD5 = '2d3f197f5e7dfc7c56af4d06fbccd698' AND file:hashes.SHA1 = '9131894f6864961f886b08e94276014385a6806b' AND file:hashes.SHA256 = '9511cf49008d992c336dd4e0d944a307043f9ce47fa0323a04585145ea18c0cc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4fe83c08-1055-407a-b799-ded69ab4fccb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:16.000Z", "modified": "2018-03-13T13:54:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9511cf49008d992c336dd4e0d944a307043f9ce47fa0323a04585145ea18c0cc/analysis/1520440071/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d808-9870-49cf-b853-435f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d809-38c8-417a-a0a4-4ffb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:27:51", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d809-a0cc-41a6-9b34-4f0602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bd503999-5a9e-43ea-bb23-776ad89490bf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:20.000Z", "modified": "2018-03-13T13:54:20.000Z", "pattern": "[file:hashes.MD5 = '3fa47f36fbf4fc08365e2078ed225c94' AND file:hashes.SHA1 = '8606b058c982c9ca6a327d61f3473b55bb9a5da4' AND file:hashes.SHA256 = 'cdcd65ada6539ae4311ac2a7edb2db6b0235edaba56266033e0690a7280504f4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a47bd8da-bdbd-4aed-9eef-a11e36096b26", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:18.000Z", "modified": "2018-03-13T13:54:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cdcd65ada6539ae4311ac2a7edb2db6b0235edaba56266033e0690a7280504f4/analysis/1517158656/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d80a-0b2c-4bb5-ab90-4b7202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d80b-ebc4-4cec-a5fd-41b202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-28 16:57:36", "category": "Other", "comment": "Executable File", "uuid": "5aa7d80b-cff8-4343-9b45-4b1b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--00af6957-6e5d-4518-a3ab-78db7b785812", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:22.000Z", "modified": "2018-03-13T13:54:22.000Z", "pattern": "[file:hashes.MD5 = '6afe1437686d6305bc8f6b9a76655830' AND file:hashes.SHA1 = 'a199a716613af0606cc7784d1a7f85e1d717ca97' AND file:hashes.SHA256 = '88969b47fe1ad89b50f5bafa46ec769622e079ebf7a498a78f7077a87b2b90a7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e9de06fa-e36b-43b5-b5da-9da311f24fe0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:21.000Z", "modified": "2018-03-13T13:54:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/88969b47fe1ad89b50f5bafa46ec769622e079ebf7a498a78f7077a87b2b90a7/analysis/1519135366/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d80d-3fec-49e3-9cd8-487d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d80d-e36c-4760-b03b-45e202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-20 14:02:46", "category": "Other", "comment": "Executable File", "uuid": "5aa7d80d-6e34-435c-8c0c-444602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5250e462-e606-43b3-af21-b25d353ca77a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:25.000Z", "modified": "2018-03-13T13:54:25.000Z", "pattern": "[file:hashes.MD5 = '5e3998004efc77b63ed39bd004e55d0f' AND file:hashes.SHA1 = 'f7a15143241a0b1373dd409dc94bde012e292e02' AND file:hashes.SHA256 = 'bda7983c416f16c74a954c37fd71af2b95f2c3e7cf9f4746d16cbe206974dba9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6ae57d88-3897-4d06-aea0-539f68acd4f0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:23.000Z", "modified": "2018-03-13T13:54:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/bda7983c416f16c74a954c37fd71af2b95f2c3e7cf9f4746d16cbe206974dba9/analysis/1520872440/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d80f-8328-4ca5-9bbe-465f02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "43/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d810-1c6c-451e-b63b-490502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 16:34:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d810-91b4-4b76-b989-4c8802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4fa3da7c-2e32-4789-aeab-967e4c7043f2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:27.000Z", "modified": "2018-03-13T13:54:27.000Z", "pattern": "[file:hashes.MD5 = '67fdb9de89f5bda1dba20757e581970c' AND file:hashes.SHA1 = 'a969e7f34a346fdb2b7b66be2a7fb5cb252eadfe' AND file:hashes.SHA256 = '7a3cba962ba9a73dd99f68a0ab7c0fb77e3268005e6645827c0015d368acb0bf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--75254811-0801-4316-b27b-df50b7439502", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:25.000Z", "modified": "2018-03-13T13:54:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7a3cba962ba9a73dd99f68a0ab7c0fb77e3268005e6645827c0015d368acb0bf/analysis/1520439347/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d811-64b0-4f9a-abf5-4ee202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d812-f43c-4657-aeeb-4c6602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:15:47", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d812-0c94-4794-80df-495802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b10a1850-a549-42eb-a281-15589b9804b9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:29.000Z", "modified": "2018-03-13T13:54:29.000Z", "pattern": "[file:hashes.MD5 = '959d8840c6d8f5a7e98aef36840cf001' AND file:hashes.SHA1 = 'c18c97faf4e49fe75ff46491731ca5ff1d1c416e' AND file:hashes.SHA256 = '74072ce0ba259e107a7f6549eefbe241831b257af8fca9a834b2b7e9c1649791']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e131e510-e043-4d38-a582-391c654a491e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:28.000Z", "modified": "2018-03-13T13:54:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/74072ce0ba259e107a7f6549eefbe241831b257af8fca9a834b2b7e9c1649791/analysis/1520439242/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d814-7f10-45b7-9224-473702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d814-b500-453c-9517-4c2a02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:14:02", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d814-39b4-455c-a352-40e802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f6a62907-ffae-4a96-b58e-a54dc45bdd71", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:32.000Z", "modified": "2018-03-13T13:54:32.000Z", "pattern": "[file:hashes.MD5 = 'afc23d6ebabe021ed4ce772a7d50d118' AND file:hashes.SHA1 = '45a3c50a210f4b16afea250d50f1784cd7ee046a' AND file:hashes.SHA256 = 'd00bdf9012c8e83fd4e7f6ddb9dee9167db6297151d48fd9ea660a6ae52239cc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--73293f69-441f-4861-8668-9babeecc2ab7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:30.000Z", "modified": "2018-03-13T13:54:30.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d00bdf9012c8e83fd4e7f6ddb9dee9167db6297151d48fd9ea660a6ae52239cc/analysis/1520488399/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d817-324c-4d62-97ef-421402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d817-65e4-43a2-b91d-478c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:53:19", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d817-10b0-4958-adb0-48eb02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--da8a4dce-3681-4781-9bcf-b6cece8ddcee", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:34.000Z", "modified": "2018-03-13T13:54:34.000Z", "pattern": "[file:hashes.MD5 = 'c7b507971f39ddf559ebe76266376633' AND file:hashes.SHA1 = '9110e50e02410ea09180205e0969deb2a24909f1' AND file:hashes.SHA256 = '3f930936e2f69619c2f0894bb65b9336052d77c8149958afb391dcfdaaecdcde']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f0b4badf-9446-4115-bd57-b2a66f55f470", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:33.000Z", "modified": "2018-03-13T13:54:33.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3f930936e2f69619c2f0894bb65b9336052d77c8149958afb391dcfdaaecdcde/analysis/1520913591/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d819-30ac-4146-b6ec-420602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d819-b664-4e76-971f-4c8202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:59:51", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d819-b4a4-4a71-9956-459002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dc5355e8-5eab-4718-9235-f1b551b863a2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:37.000Z", "modified": "2018-03-13T13:54:37.000Z", "pattern": "[file:hashes.MD5 = 'c1effd346e1b86b3bf35787efdf7f81f' AND file:hashes.SHA1 = '038db79cb691beb2927d19a82bdbd2a20100cb58' AND file:hashes.SHA256 = '3978407f6443e5396459bd2971b27cfbc5297aadec810bc0dc15f365a257b58d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2d79df26-7862-4e28-acf6-b6b1a331755e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:35.000Z", "modified": "2018-03-13T13:54:35.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/3978407f6443e5396459bd2971b27cfbc5297aadec810bc0dc15f365a257b58d/analysis/1520488271/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d81b-5c48-4f4b-bab4-4d3502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d81b-544c-4c13-bc25-4e4c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:51:11", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d81b-63fc-45f0-aa39-4bf902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d5911876-ca1d-4b22-8c38-7119fca9fa0e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:39.000Z", "modified": "2018-03-13T13:54:39.000Z", "pattern": "[file:hashes.MD5 = '763631361fdde3cd833b64c8fbaf0ad8' AND file:hashes.SHA1 = '176702fff1100fda59be0cd2861d1cbe960e73c0' AND file:hashes.SHA256 = 'd70c43fde7ab1dc8428a794e860c7aaa14c5a5c70747489bd3f2f16bcc8ea6d0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--487e2e6b-c536-4df1-accb-a29b42e96b2c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:37.000Z", "modified": "2018-03-13T13:54:37.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d70c43fde7ab1dc8428a794e860c7aaa14c5a5c70747489bd3f2f16bcc8ea6d0/analysis/1520376542/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d81d-d670-4bc1-943b-404b02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d81e-c5b0-4bee-a996-439902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:49:02", "category": "Other", "comment": "Executable File", "uuid": "5aa7d81e-85e8-48b8-bfed-44c502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0e4cac6a-d9b5-4118-bde4-60ad3a609a8f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:41.000Z", "modified": "2018-03-13T13:54:41.000Z", "pattern": "[file:hashes.MD5 = 'f7e7d35f5067f18b8b57a10d506be3d6' AND file:hashes.SHA1 = 'da351f14024a262a69b2358a3fc2b6469e14021f' AND file:hashes.SHA256 = '5f0ce2e522623fb51201212af72af0851f1a3b9c2f06cf74bb26d73eebb3fc14']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--146e4c31-21b3-46fe-b8de-7f769392972f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:39.000Z", "modified": "2018-03-13T13:54:39.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5f0ce2e522623fb51201212af72af0851f1a3b9c2f06cf74bb26d73eebb3fc14/analysis/1517151779/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d81f-e3f0-4c73-87f5-462c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d820-0350-4117-abb7-413d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-28 15:02:59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d820-f488-405c-8f5a-4d9402de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f0b0d5df-1bae-410a-9926-6a0e64f64ff6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:43.000Z", "modified": "2018-03-13T13:54:43.000Z", "pattern": "[file:hashes.MD5 = 'acdb52ba10e89aec5fe717f428636875' AND file:hashes.SHA1 = 'df4bec2c8db28c8d5a9892c9b716825bb82ce467' AND file:hashes.SHA256 = 'd156e14065b5293a5511a027e6943399b3450a6b3ff74c50e31b3b7f4a1153f1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--69b924fb-8254-413e-9800-544b82939ba8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:42.000Z", "modified": "2018-03-13T13:54:42.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d156e14065b5293a5511a027e6943399b3450a6b3ff74c50e31b3b7f4a1153f1/analysis/1520376480/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d822-cfd8-4c22-accb-4c0902de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "27/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d822-4ac4-4f9a-9b7c-4f2302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d822-8490-43d5-ad99-40af02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--26df4a37-ab0a-4532-96d1-f2e7c0109bd1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:46.000Z", "modified": "2018-03-13T13:54:46.000Z", "pattern": "[file:hashes.MD5 = 'c2a627770f18264c9641554fa234398d' AND file:hashes.SHA1 = '496972b5f47bc0f23f170b6a49fb3b268ffc4c11' AND file:hashes.SHA256 = '07b4420172aded36c50bc312fbb22779ee8f166a28b0ae6a2e38fdcde8e37317']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:46Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5e7ba62c-dec2-4434-9031-ecbe140bfe09", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:44.000Z", "modified": "2018-03-13T13:54:44.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/07b4420172aded36c50bc312fbb22779ee8f166a28b0ae6a2e38fdcde8e37317/analysis/1519316589/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d824-0384-4e83-a096-45df02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d825-f320-4e7d-90c0-451602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-22 16:23:09", "category": "Other", "comment": "Executable File", "uuid": "5aa7d825-71a4-4ca6-92fd-478502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--077ac4ee-08ca-446e-88e3-c860f15d6e42", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:48.000Z", "modified": "2018-03-13T13:54:48.000Z", "pattern": "[file:hashes.MD5 = '254ab1ad65bfeeddb79e8c700671e2f4' AND file:hashes.SHA1 = 'f36abc60423b27c693c4ba3cbe36ff4cf69777d3' AND file:hashes.SHA256 = '79905733dd082deeeb5dc87b9f394c3bbb06b3097cdb53e7ce8bc3c4b460809f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--19dbb91d-5dc1-4a68-beb7-2855a8b55944", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:46.000Z", "modified": "2018-03-13T13:54:46.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/79905733dd082deeeb5dc87b9f394c3bbb06b3097cdb53e7ce8bc3c4b460809f/analysis/1520913592/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d827-0ddc-48ae-9f03-4dfa02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d827-b51c-42be-8943-45d702de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:59:52", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d827-6044-42df-9503-4b7e02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--16be79c8-3fcf-49ad-9a56-0c21f71a340a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:50.000Z", "modified": "2018-03-13T13:54:50.000Z", "pattern": "[file:hashes.MD5 = 'a55555eb16d14828109fc31285a8fca3' AND file:hashes.SHA1 = '67eca0a4a2e2589007d94ee23fc0f8d16a659572' AND file:hashes.SHA256 = '8f4533d820eb7f55e55c9ddff65cb629b0bdbe97d0f14d25d5d820acd18938af']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--89a77099-d59d-44d4-8a59-0738bb796d43", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:49.000Z", "modified": "2018-03-13T13:54:49.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/8f4533d820eb7f55e55c9ddff65cb629b0bdbe97d0f14d25d5d820acd18938af/analysis/1520376456/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d829-35a0-4b29-aac1-4c1402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/59", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d829-4c78-4886-91ab-4fff02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:47:36", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d829-4610-491b-ab70-47aa02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9652d6e1-a194-4a6a-929c-e7e956850f89", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:53.000Z", "modified": "2018-03-13T13:54:53.000Z", "pattern": "[file:hashes.MD5 = 'c44937768caeee00db7c39dbb803d4bc' AND file:hashes.SHA1 = '9b92e3c20e973a43b150449e7e94c4cd8e9c2784' AND file:hashes.SHA256 = 'de56fa75b0a7774bdba6e58dd1a1cc06b6b2b40d96189716612a07f4817a8d28']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:53Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--52a4df42-1337-4088-bf56-b667387402a3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:51.000Z", "modified": "2018-03-13T13:54:51.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/de56fa75b0a7774bdba6e58dd1a1cc06b6b2b40d96189716612a07f4817a8d28/analysis/1519857101/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d82b-c51c-4fed-a8c0-479c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d82c-72fc-4d46-9d4c-47d302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-28 22:31:41", "category": "Other", "comment": "Executable File", "uuid": "5aa7d82c-e170-4edb-9509-4b7102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d1d8a404-37d2-4f24-9178-8bc2dbe65ccf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:55.000Z", "modified": "2018-03-13T13:54:55.000Z", "pattern": "[file:hashes.MD5 = '8b64198342354332179dc210e968f361' AND file:hashes.SHA1 = 'd9cc2829430c09ccfcea929374f0750b42ec17eb' AND file:hashes.SHA256 = 'cece67cd2b40b314c9ae10efa5468cc8c734a9d609f2b6df159fc87d56a55926']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:55Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--97568f59-097d-4e72-b4dc-fd68c408c85a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:53.000Z", "modified": "2018-03-13T13:54:53.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cece67cd2b40b314c9ae10efa5468cc8c734a9d609f2b6df159fc87d56a55926/analysis/1520839560/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d82e-304c-43d6-b0eb-42dd02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/64", "category": "Other", "comment": "Executable File", "uuid": "5aa7d82e-2c28-4bee-94bd-451602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 07:26:00", "category": "Other", "comment": "Executable File", "uuid": "5aa7d82e-8990-40f5-aa43-4ec102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--03e306e0-62ae-4534-912a-59d311bc5ccc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:57.000Z", "modified": "2018-03-13T13:54:57.000Z", "pattern": "[file:hashes.MD5 = 'ce9fd40d404d258405e38f78f08c0912' AND file:hashes.SHA1 = '0936f307d2aa64cc6236726a4b906bf6ce605c50' AND file:hashes.SHA256 = 'd158c1111de1b21a41af1099e0718ecda240a42636a5456ce2074f3ee6f7ba9a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:54:57Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9b39352a-bfd8-4477-ac80-b9092c06bf88", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:56.000Z", "modified": "2018-03-13T13:54:56.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d158c1111de1b21a41af1099e0718ecda240a42636a5456ce2074f3ee6f7ba9a/analysis/1520376481/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d830-4378-48a3-9c3a-4ff802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d830-5a24-4235-be2a-424202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:01", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d830-40b0-4d20-8c79-413b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3d85b1c8-be3d-4656-918a-168f4f155069", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:00.000Z", "modified": "2018-03-13T13:55:00.000Z", "pattern": "[file:hashes.MD5 = 'd0f90a384400bb044584c3bd808bd5d4' AND file:hashes.SHA1 = 'c977acc0d5e8aea57f92112bf2b9e4a796bebdc5' AND file:hashes.SHA256 = '7e0bea576dcde7384084a7e8754876a75ee3db4711c30d28585e157d9827b13d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:00Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1c6103ea-83ca-4a82-aeda-c4aa8f13e23c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:54:58.000Z", "modified": "2018-03-13T13:54:58.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7e0bea576dcde7384084a7e8754876a75ee3db4711c30d28585e157d9827b13d/analysis/1512363483/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d832-8190-43e5-a131-4e6302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d833-2c84-4d53-8985-4dac02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-04 04:58:03", "category": "Other", "comment": "Executable File", "uuid": "5aa7d833-6944-4dcf-bbf6-437002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--04b2a401-b201-464d-810b-88383d077361", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:02.000Z", "modified": "2018-03-13T13:55:02.000Z", "pattern": "[file:hashes.MD5 = 'bb42a48c6200fcfa0d98360d1aae0ce5' AND file:hashes.SHA1 = 'd6f2c47ee75c86d0728bf5a2c7e58a0d036e12a8' AND file:hashes.SHA256 = 'cefb8008b9d77d635842c5cc141fb47243ab1c2ce42145e2c2cf27ff341ae3fc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:02Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--aa6b3be5-ea62-429f-8e69-13ae6bed6d86", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:00.000Z", "modified": "2018-03-13T13:55:00.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/cefb8008b9d77d635842c5cc141fb47243ab1c2ce42145e2c2cf27ff341ae3fc/analysis/1519872628/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d835-0c68-41eb-8c2c-42b602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d835-fee4-44fa-8447-4f9602de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-01 02:50:28", "category": "Other", "comment": "Executable File", "uuid": "5aa7d835-d544-4c4c-8025-404602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--882870ac-fcf6-4458-b142-3c80c26ccbe9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:04.000Z", "modified": "2018-03-13T13:55:04.000Z", "pattern": "[file:hashes.MD5 = 'e7eeca7562049a6b10d7c6e0257ecdc9' AND file:hashes.SHA1 = 'b8dd823d094868f973f44e5c5a59895aba30a444' AND file:hashes.SHA256 = '70dad100507788e071b1f3f8be7c2e97a245b277510dcdcf31db82b2f826edf9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--87ca3a43-63b2-4b36-bc14-b1d410544873", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:04.000Z", "modified": "2018-03-13T13:55:04.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/70dad100507788e071b1f3f8be7c2e97a245b277510dcdcf31db82b2f826edf9/analysis/1520488287/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d838-f5e4-406c-8d45-485a02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d838-0cd0-40be-b899-4bc402de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-08 05:51:27", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d839-deb0-4130-b73f-444102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d054c158-41ed-4da9-a47d-6a27d632286f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:08.000Z", "modified": "2018-03-13T13:55:08.000Z", "pattern": "[file:hashes.MD5 = '13cc41d1578417fa57c72294d5f0b326' AND file:hashes.SHA1 = '200bbb4090ea91161da6d5c120677dca4ebb8356' AND file:hashes.SHA256 = 'e58a63d24e82bf00fc092c56e6ee75f0e3f0318dc0dbc6093897645795e3fa9b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:08Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a3318579-3b87-4794-aa53-dceb5cb0f91d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:07.000Z", "modified": "2018-03-13T13:55:07.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/e58a63d24e82bf00fc092c56e6ee75f0e3f0318dc0dbc6093897645795e3fa9b/analysis/1513005955/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d83b-d848-4cc1-a4dd-459c02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "42/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d83b-135c-477a-890b-436d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-11 15:25:55", "category": "Other", "comment": "Executable File", "uuid": "5aa7d83b-f1e8-4f0f-a06f-47ce02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--56f36f82-1ba1-4809-a5e7-90cd21f3aaa0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:10.000Z", "modified": "2018-03-13T13:55:10.000Z", "pattern": "[file:hashes.MD5 = '29690454bbf154e2614ec977f417d40f' AND file:hashes.SHA1 = 'c0a065fefe3d94921bcbab910de8043c6ed157e9' AND file:hashes.SHA256 = '5dd05cc4deff26be3bce97a0814a1513080e1579021eea6771b2a9842050eb80']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:10Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f5228bc9-0596-44c7-a7d1-fb756784412d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:09.000Z", "modified": "2018-03-13T13:55:09.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/5dd05cc4deff26be3bce97a0814a1513080e1579021eea6771b2a9842050eb80/analysis/1518756138/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d83d-b024-47f4-bdea-446302de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d83d-a0dc-4eef-8e57-42ed02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-02-16 04:42:18", "category": "Other", "comment": "Executable File", "uuid": "5aa7d83d-d2b0-4bb5-85a6-4dc902de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b91e8990-cf2b-407a-8991-bbb3608c6b9e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:13.000Z", "modified": "2018-03-13T13:55:13.000Z", "pattern": "[file:hashes.MD5 = 'fdc33a071fff70798295b2ec22cbf735' AND file:hashes.SHA1 = '723da0bf4eb558853763d4b4ec58243709d7e0ae' AND file:hashes.SHA256 = 'd1f29d6ffb069c12670a264bf12a7ad4fc1c159b7f6aa61c97cd90d44289eec3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f83f28b9-063a-446a-8f9c-38f9c269399b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:11.000Z", "modified": "2018-03-13T13:55:11.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/d1f29d6ffb069c12670a264bf12a7ad4fc1c159b7f6aa61c97cd90d44289eec3/analysis/1520376481/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d83f-d96c-4b2f-b5d7-420702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d83f-5af8-4b6b-92ab-42d502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-06 22:48:01", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d840-1868-4ff5-b011-474102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e4a9332e-e3d0-46c9-ba7d-ca1c7293848e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:15.000Z", "modified": "2018-03-13T13:55:15.000Z", "pattern": "[file:hashes.MD5 = 'ba58bf4aedb3a7af5a087e09531be350' AND file:hashes.SHA1 = 'a59220584d13e4c38180567b92d1d971f01107db' AND file:hashes.SHA256 = 'a4335d27b9ca8ab14154aff918034194a98a12eb25607e00613965bf053bcba6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--320ba851-d81c-484f-894a-701364ece4c0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:13.000Z", "modified": "2018-03-13T13:55:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a4335d27b9ca8ab14154aff918034194a98a12eb25607e00613965bf053bcba6/analysis/1512918823/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d841-0048-4632-ae8a-417002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "53/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d842-5214-47f8-a7b8-4dc002de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-10 15:13:43", "category": "Other", "comment": "Executable File", "uuid": "5aa7d842-83b4-44d3-a06f-493002de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b3324698-2b4a-471c-b45b-e2f397b81af6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:17.000Z", "modified": "2018-03-13T13:55:17.000Z", "pattern": "[file:hashes.MD5 = 'e0cc68661299ee7f8b728b502b068ded' AND file:hashes.SHA1 = 'c1c6daa77ca105f36a52de957bc6336e7e637a84' AND file:hashes.SHA256 = 'ae80eba1667456db827400aee3639bc03380ce4dec806c4c1b0485ce96b99bae']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--077cc537-080b-4c47-bf21-7df045b20744", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:16.000Z", "modified": "2018-03-13T13:55:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/ae80eba1667456db827400aee3639bc03380ce4dec806c4c1b0485ce96b99bae/analysis/1512484587/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d844-f078-4403-839c-478d02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "24/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d844-6f00-45bd-983a-4fbf02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-05 14:36:27", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d845-7d24-484a-8b0e-4f1502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9fa8595c-97de-41fd-9276-d562acbefb96", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:20.000Z", "modified": "2018-03-13T13:55:20.000Z", "pattern": "[file:hashes.MD5 = 'fff8783b7567821cec8838d075d247e1' AND file:hashes.SHA1 = '86330fec722747aafa5df0b008a46e3baeb30fa7' AND file:hashes.SHA256 = '258513db7949cd16330a90b2d46925768631bb54769c8d43dcfe3bf0b2617ab1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--dd2d5a11-f02f-400b-9d17-a9e9147288ee", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:18.000Z", "modified": "2018-03-13T13:55:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/258513db7949cd16330a90b2d46925768631bb54769c8d43dcfe3bf0b2617ab1/analysis/1520913596/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d846-1274-45a9-b391-4d2702de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/67", "category": "Other", "comment": "Executable File", "uuid": "5aa7d847-fdc4-4eaf-b731-45a502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:59:56", "category": "Other", "comment": "Executable File", "uuid": "5aa7d847-6528-4b3a-ba2f-4bd602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--446c3020-b0e4-492c-bd12-7066f1104d9d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:22.000Z", "modified": "2018-03-13T13:55:22.000Z", "pattern": "[file:hashes.MD5 = 'd416a1e271580d4bb683527e3ca846ec' AND file:hashes.SHA1 = '01aa4499c9bf2be0df184d0b6c48c7bf712dc925' AND file:hashes.SHA256 = 'f4f6391577fae61e6aca3040ca8fad69ea545cfc9cfeaf876f92be42e1ce8f5f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0888e8dc-2d19-41be-b507-e64d24336064", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:21.000Z", "modified": "2018-03-13T13:55:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/f4f6391577fae61e6aca3040ca8fad69ea545cfc9cfeaf876f92be42e1ce8f5f/analysis/1513097217/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d849-6d58-401b-8565-41dc02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/66", "category": "Other", "comment": "Executable File", "uuid": "5aa7d849-a788-4722-87ec-4dfa02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-12 16:46:57", "category": "Other", "comment": "Executable File", "uuid": "5aa7d849-c8c0-4ee7-9a1d-47a302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ec43784b-9ba5-4e7f-8dfe-5a027d2a39c2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:25.000Z", "modified": "2018-03-13T13:55:25.000Z", "pattern": "[file:hashes.MD5 = '9386dba97202778f2fbe902d98713fa2' AND file:hashes.SHA1 = 'd68a1e362f0c0fda979e939bcefb6710d03807e6' AND file:hashes.SHA256 = '29970afb6fc25dfc761fd513bb29ae79cef090d4f667a54fd5c51b9835521c93']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--66b5dbaf-aead-471a-be05-03d7ceecff15", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:23.000Z", "modified": "2018-03-13T13:55:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/29970afb6fc25dfc761fd513bb29ae79cef090d4f667a54fd5c51b9835521c93/analysis/1520437795/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d84b-cb14-4a19-8943-461e02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "34/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d84b-a29c-4461-abee-4b0d02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 15:49:55", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d84b-bea0-4d79-9132-40b502de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2a2a5f55-bf30-419d-8aca-626ac8cff579", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:27.000Z", "modified": "2018-03-13T13:55:27.000Z", "pattern": "[file:hashes.MD5 = '3a375ffa8c1ea1c84fe887c69535a096' AND file:hashes.SHA1 = '6606cabc526bf83dc67ec662ff8d73b89863451d' AND file:hashes.SHA256 = '7726a78b870ceab360e0c044b7f6a10a61283c814de09e870e49187927bd71bb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--feeab5d5-1436-4855-9ba9-bfd9f5c956ec", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:25.000Z", "modified": "2018-03-13T13:55:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/7726a78b870ceab360e0c044b7f6a10a61283c814de09e870e49187927bd71bb/analysis/1515012587/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d84d-1620-4c33-aea2-44d002de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "28/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d84e-ae38-4c3a-add3-484c02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 20:49:47", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d84e-ef54-474b-9506-4aaa02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5db9b3d7-9465-4c17-96f8-f5ed425224aa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:29.000Z", "modified": "2018-03-13T13:55:29.000Z", "pattern": "[file:hashes.MD5 = '20cf15ce96e40c5f79778259b23d1eb3' AND file:hashes.SHA1 = '6ae7a39fd3d8d192118a68a01c23d0d181029e94' AND file:hashes.SHA256 = '97d6ad9fc1758ed1312135fb283acdbfe4c8af484ad84be035886d630b5b488b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f9c1b826-7799-4c2c-a723-07377a3d1bfd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:28.000Z", "modified": "2018-03-13T13:55:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/97d6ad9fc1758ed1312135fb283acdbfe4c8af484ad84be035886d630b5b488b/analysis/1520440097/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d850-43bc-4c9f-9772-4e5602de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d850-2bf0-4490-83ae-4d3202de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:28:17", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d850-acc4-47d0-aa93-46be02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3be79107-b34a-4c7f-ba2c-fef85b1cee8b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:32.000Z", "modified": "2018-03-13T13:55:32.000Z", "pattern": "[file:hashes.MD5 = '567e9750bf01828f3e1a5385768ecb15' AND file:hashes.SHA1 = '0bfff87f65f9eedd23f522f23433a4c359fdb16a' AND file:hashes.SHA256 = '9daa9be7e3d45f1a04476c969a8f73362bdd960ae3b5b5bf02ca01c958ac1db7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:32Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--166bda7d-6c12-4ddc-a33f-2d4ef0d3ec3d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:30.000Z", "modified": "2018-03-13T13:55:30.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/9daa9be7e3d45f1a04476c969a8f73362bdd960ae3b5b5bf02ca01c958ac1db7/analysis/1520913242/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d852-91cc-43fd-93bc-43c402de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d853-38c8-4376-bc71-496e02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-13 03:54:02", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d853-0df0-4058-9feb-436102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6baeead3-c809-41df-b607-ca5848e68fb1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:34.000Z", "modified": "2018-03-13T13:55:34.000Z", "pattern": "[file:hashes.MD5 = 'bf3628109b384926c0daf5ef34446282' AND file:hashes.SHA1 = '03cb29686389c965dd0176c318ede853e547054a' AND file:hashes.SHA256 = 'b5a71e35a190c091720e643f0dedc09c07cd481f11cfb23866f2adecff8728be']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:34Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f491f23c-43cf-4453-87db-3607b86510a4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:33.000Z", "modified": "2018-03-13T13:55:33.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/b5a71e35a190c091720e643f0dedc09c07cd481f11cfb23866f2adecff8728be/analysis/1520856000/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d855-218c-4c0b-a3c4-4e9502de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d855-08ac-45ad-91f6-4acb02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-12 12:00:00", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d855-791c-4e55-ac4c-4ce102de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ae8e3d01-4e47-42df-9607-9167544acc06", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:37.000Z", "modified": "2018-03-13T13:55:37.000Z", "pattern": "[file:hashes.MD5 = 'c9fd045485efe0eefabc6d81b4369d2c' AND file:hashes.SHA1 = '7caedadb59379ed1d502a391e37b4869425a2e58' AND file:hashes.SHA256 = 'a6a8117150a1bcb6ec16b6c002a341ab54a912190421cb404d147438bf39474a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5062fa66-2e6c-4fe1-8aa7-43cf26de6aad", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:35.000Z", "modified": "2018-03-13T13:55:35.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/a6a8117150a1bcb6ec16b6c002a341ab54a912190421cb404d147438bf39474a/analysis/1520440308/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d857-02c0-4de3-9c2c-421802de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "33/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d858-f3b8-47fa-87d4-4d4302de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-07 16:31:48", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d858-92b0-4b34-89f0-4a8b02de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7fb8d9ab-db52-4104-8f75-f38f288d8b1e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:39.000Z", "modified": "2018-03-13T13:55:39.000Z", "pattern": "[file:hashes.MD5 = '313aae5a7a00b2fc091b3409cc053865' AND file:hashes.SHA1 = 'ac75194fcf1b9d0759ede92de30735adf16859a8' AND file:hashes.SHA256 = '076c6d0b22fb063e85d1ca6be08b9d5b202b2a543d7a9aa9a2f525acb3c8900b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4ee3557a-7d82-4325-9be5-ce3d1ad60f98", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:37.000Z", "modified": "2018-03-13T13:55:37.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/076c6d0b22fb063e85d1ca6be08b9d5b202b2a543d7a9aa9a2f525acb3c8900b/analysis/1520585122/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d85a-8288-4033-bf4a-42e202de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/60", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d85a-6838-4d71-8ac8-41e502de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-03-09 08:45:22", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d85a-2248-4c16-b408-41d302de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6f20eba9-8ddc-4fd2-8308-09ad81eab0c7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:41.000Z", "modified": "2018-03-13T13:55:41.000Z", "pattern": "[file:hashes.MD5 = 'ca45c38f09001d8e24da218ae793d65b' AND file:hashes.SHA1 = '21b703b1607970983b338307e0ecd7e115585da9' AND file:hashes.SHA256 = 'dd58286c5ce17c1c18cd7c13aa61cdc97bd483a98e79c9ab474d6ff6f1ba1269']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:41Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--be45c6a2-715c-4c95-9375-97988cb782a5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:40.000Z", "modified": "2018-03-13T13:55:40.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/dd58286c5ce17c1c18cd7c13aa61cdc97bd483a98e79c9ab474d6ff6f1ba1269/analysis/1514282989/", "category": "External analysis", "comment": "Executable File", "uuid": "5aa7d85c-7354-4402-b744-46ae02de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/68", "category": "Other", "comment": "Executable File", "uuid": "5aa7d85c-1964-4ed6-8820-41de02de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2017-12-26 10:09:49", "category": "Other", "comment": "Executable File", "uuid": "5aa7d85c-8ee0-4910-b11c-40a602de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c8442b78-eb30-4e6b-82f8-c493beab29ad", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:44.000Z", "modified": "2018-03-13T13:55:44.000Z", "pattern": "[file:hashes.MD5 = 'adb0b9002dc5f61e9ee811411b844af2' AND file:hashes.SHA1 = '7896cd0a62508b5e8b1b62766aea17c76f3a13c9' AND file:hashes.SHA256 = '0e8ed0237d187dc5de5406b46f248f090fa50035bdb927944853268e22c3016f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2018-03-13T13:55:44Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b15ff2f5-a898-4dbf-92ef-2630c13bcb9f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2018-03-13T13:55:42.000Z", "modified": "2018-03-13T13:55:42.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/file/0e8ed0237d187dc5de5406b46f248f090fa50035bdb927944853268e22c3016f/analysis/1514998571/", "category": "External analysis", "comment": "Malicious Document", "uuid": "5aa7d85e-6b50-4d53-b13a-4b9102de0b81" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/61", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d85e-78e0-4525-8600-4e5902de0b81" }, { "type": "datetime", "object_relation": "last-submission", "value": "2018-01-03 16:56:11", "category": "Other", "comment": "Malicious Document", "uuid": "5aa7d85e-fc30-48a8-ac50-412802de0b81" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8cc2e843-ac80-4041-9115-e9e3769542ca", "created": "2018-03-13T13:55:43.000Z", "modified": "2018-03-13T13:55:43.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3ebecaa7-b9a3-48a4-becf-194625b24f9d", "target_ref": "x-misp-object--be09f3b1-9fcf-4d5b-848e-41fecd41123d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--02fc0f77-2511-4334-a3ff-5b7e523987c5", "created": "2018-03-13T13:55:43.000Z", "modified": "2018-03-13T13:55:43.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b5694caa-9b22-415f-8272-9c57b3eb08c3", "target_ref": "x-misp-object--2b4622e3-ecfd-4e33-88d1-4be6fee2d27e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--09ad612f-4f5a-480b-beed-69509535f0ec", "created": "2018-03-13T13:55:43.000Z", "modified": "2018-03-13T13:55:43.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--04a11bb7-a841-49e4-b957-a50ff66a07ef", "target_ref": "x-misp-object--da8cc514-e9c2-43ba-8713-65bd1ee4cc93" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--bc27d892-462e-4631-9518-7c9ff46ef641", "created": "2018-03-13T13:55:43.000Z", "modified": "2018-03-13T13:55:43.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--010c6b65-7d24-4eb1-b9f3-161e4bf63908", "target_ref": "x-misp-object--3027a1fa-cc56-4b97-9c23-f87a15628a5c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6c0ad717-248d-4170-96b6-784a40721bb2", "created": "2018-03-13T13:55:43.000Z", "modified": "2018-03-13T13:55:43.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2ea254d8-6356-40c2-962f-e9a22e94b9a2", "target_ref": "x-misp-object--a0e300ab-5db9-439a-a31d-078a28483155" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3891a8cb-a476-46b1-9ad5-61c028ac0731", "created": "2018-03-13T13:55:43.000Z", "modified": "2018-03-13T13:55:43.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7aa4af10-cefa-4496-aa7c-aecaa6ba6915", "target_ref": "x-misp-object--168731b1-b9f6-49e3-8396-e43356f48865" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--39c7b9e6-2117-4908-b1f2-73aba03f1817", "created": "2018-03-13T13:55:43.000Z", "modified": "2018-03-13T13:55:43.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c3854528-0d86-43d7-9af1-c892adaa2014", "target_ref": "x-misp-object--e3120171-4e17-469d-87cd-1c3b2214b193" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ae4cd86b-f153-4097-b7c0-64bc993390f7", "created": "2018-03-13T13:55:43.000Z", "modified": "2018-03-13T13:55:43.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--32755cdb-a46a-4796-a3dc-8cdac5895b13", "target_ref": "x-misp-object--c8f2386e-a26d-4911-8a45-e5f037add7f3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--53864d4b-fa85-4579-8e3a-d3c9af5f55ac", "created": "2018-03-13T13:55:44.000Z", "modified": "2018-03-13T13:55:44.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--83b23c1f-380c-4c9b-8ff1-d88a0d77e200", "target_ref": "x-misp-object--38764b5c-c154-4392-a0c3-7574c19b999c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--739cac21-951d-4910-a142-41f77904b78c", "created": "2018-03-13T13:55:44.000Z", "modified": "2018-03-13T13:55:44.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--91f03806-38a6-41c7-bf7b-59cde7114d4c", "target_ref": "x-misp-object--06833811-1d61-4866-b351-c35e84d53f29" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--85c8ca4f-a260-4310-a5ad-5031a4c208a7", "created": "2018-03-13T13:55:44.000Z", "modified": "2018-03-13T13:55:44.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1862b97f-3ec9-4764-af14-cb1a39e2e1e2", "target_ref": "x-misp-object--0e9a8a1d-4d35-4624-8a79-456fb80187e4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b271f609-330b-4e1f-8faf-c7858d1179b6", "created": "2018-03-13T13:55:44.000Z", "modified": "2018-03-13T13:55:44.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--333502f7-2faf-4732-9cf8-0b57085db280", "target_ref": "x-misp-object--a0cd4885-4c2a-4471-a8a5-03700ab2cf77" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--99e4bc1d-8512-439e-b3c2-a05e53ee0158", "created": "2018-03-13T13:55:44.000Z", "modified": "2018-03-13T13:55:44.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3df64f90-91fe-4af4-b4fe-8fd371df1e2b", "target_ref": "x-misp-object--05943cc4-e0ee-4d46-b752-673fd1f9347d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--53f2ec9e-dc10-49d1-b165-76bde89c6e0d", "created": "2018-03-13T13:55:44.000Z", "modified": "2018-03-13T13:55:44.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--73813f31-8277-4a96-abec-99d11d5855d7", "target_ref": "x-misp-object--a9d050ef-1ff4-4906-a484-cf8f3f7cad84" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--cc207191-3c18-490a-b25d-f43bcc2d1451", "created": "2018-03-13T13:55:44.000Z", "modified": "2018-03-13T13:55:44.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7a9ebf88-5d69-41e7-a572-971cb751e615", "target_ref": "x-misp-object--98f9a90f-6b1c-45b3-a027-9837ecbb6875" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b5aba582-2b36-4cc4-b021-a0a7f04d987a", "created": "2018-03-13T13:55:44.000Z", "modified": "2018-03-13T13:55:44.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--694ccc7c-c1e3-459c-be5e-8bbb60cf776d", "target_ref": "x-misp-object--16b262fe-fc38-4a41-aae1-f7c79a3f2b27" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f7701484-6a1e-404e-906d-53ca0bc4c232", "created": "2018-03-13T13:55:44.000Z", "modified": "2018-03-13T13:55:44.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7fbaea4b-0ef0-409d-80eb-82e5dfba5994", "target_ref": "x-misp-object--eb32ed3c-79fb-4635-9706-c65725f4925c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--87c23067-1e48-4051-a303-27a5f788521c", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2bf82666-d839-4cb4-9d62-47afcbabb8d8", "target_ref": "x-misp-object--72530e57-9793-49b0-a161-0078753a7e2a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ec333403-57bf-40ba-b004-0b341b9ae9f9", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5061f21a-a424-479d-b119-eb03ca72474a", "target_ref": "x-misp-object--9bf45a52-e2d6-4363-85cd-9f1762674618" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--444d7642-e1b0-4270-95b2-020e14dd7670", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d3f36e32-07db-4834-8c85-432352352e55", "target_ref": "x-misp-object--e89df188-9ef2-4fb1-af1e-7d8990320d01" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c3027171-65ac-4ac6-af0c-0c8535470ad5", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b6089b1d-ce2c-482b-acbd-4940ddf9b43d", "target_ref": "x-misp-object--776e3fae-22a7-473d-8c9e-448f7cebe70c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d5b91ceb-59f5-4342-ad32-ef98a4f749e2", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--943bbe65-be8f-4fcd-a963-8f40bee18ea7", "target_ref": "x-misp-object--327db92f-c41f-47c6-9791-7cde1d9ce511" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c3a03966-3809-42d1-bd6f-efeefc77beca", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8a6de377-1b81-4988-9132-ed8d9ecf36ff", "target_ref": "x-misp-object--3ea6b034-235f-44ae-984c-8e5d8e2b3499" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1af6ba63-f61f-45f2-89c1-fc41ee9fa1a0", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--39755ccf-9fff-4b16-b894-a4742fe0b548", "target_ref": "x-misp-object--84cb6f05-0dd6-4fd0-869b-5051282359e6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d2f0efd3-21ea-46f2-82eb-d300cb6e705e", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f2989d98-57c2-4e75-b139-d98f1debcd6e", "target_ref": "x-misp-object--91ba1536-8bd4-4a09-a11f-590dd2f76adb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9e4994bf-a8d7-4f16-96d1-5ac8bfdc855c", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4846a202-a825-4439-a27b-2e9855f3e75b", "target_ref": "x-misp-object--fac91df2-91df-4947-8855-c63df8ea4719" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7c78c848-64ed-4b99-9981-51ca547b8c7d", "created": "2018-03-13T13:55:45.000Z", "modified": "2018-03-13T13:55:45.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e01012ad-efbd-43a2-ae1e-925c8c88bdfb", "target_ref": "x-misp-object--875c39a6-aefb-4cab-8dd1-76de2098bc65" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1a3c3cc8-fc38-42e3-9f73-253bb6d0355f", "created": "2018-03-13T13:55:46.000Z", "modified": "2018-03-13T13:55:46.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--170a0ade-9dbd-46a0-88c8-9b9c31f603df", "target_ref": "x-misp-object--ee355cf8-ecb9-43f6-8af7-149019418b7d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e9fc5c71-cb86-4183-ba4d-1767eead01bf", "created": "2018-03-13T13:55:46.000Z", "modified": "2018-03-13T13:55:46.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--acaf2fa6-6f3c-4b06-a5f9-3bb31b191409", "target_ref": "x-misp-object--1eb655cb-6991-4136-9a71-5d07c824734e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ad486d24-4124-4816-a0c7-2a322a871f68", "created": "2018-03-13T13:55:46.000Z", "modified": "2018-03-13T13:55:46.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--57b549c9-a6f5-4fbe-93de-835d64e5d801", "target_ref": "x-misp-object--1c17f990-5b27-40d9-a80b-e2ff9a10c38f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--37594a47-7da8-4b89-a23f-89ebf22fd5e5", "created": "2018-03-13T13:55:46.000Z", "modified": "2018-03-13T13:55:46.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--83846430-c5cf-403f-821c-665b6d7d24ae", "target_ref": "x-misp-object--bac69422-8149-4b9b-b191-268f042035aa" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0da6fdfb-fd70-41fa-b6d2-9b3d33c2a0e2", "created": "2018-03-13T13:55:46.000Z", "modified": "2018-03-13T13:55:46.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f7e44f2c-acce-4a13-bb4f-7a8a3f561f6a", "target_ref": "x-misp-object--1bdd2424-ec61-48b5-b0fc-cfe234973c69" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fb02d7e7-2497-48c9-9b0c-1504e0daf5ec", "created": "2018-03-13T13:55:46.000Z", "modified": "2018-03-13T13:55:46.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--860df4c8-2d41-4fc7-b3fc-abea9a79399a", "target_ref": "x-misp-object--cd3742e9-9515-451b-9d86-0900994ffe1e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--102c405f-a598-4e8b-99be-93cf928925a1", "created": "2018-03-13T13:55:46.000Z", "modified": "2018-03-13T13:55:46.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f2bf99ab-22ca-42a8-ade9-dd3259513e1d", "target_ref": "x-misp-object--f7a2f44d-913b-412f-8a87-29015a121194" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9bc6df54-59d5-4178-a93e-6466d6f66d76", "created": "2018-03-13T13:55:46.000Z", "modified": "2018-03-13T13:55:46.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3cdbd820-ccfe-4805-a87f-66639a605863", "target_ref": "x-misp-object--d295ca83-4c3b-44e9-bf94-8ea103e0ca84" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1de0fe3e-37bb-4401-8d49-382451218816", "created": "2018-03-13T13:55:46.000Z", "modified": "2018-03-13T13:55:46.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5282a1ef-c68b-441b-b128-7b98762c7db5", "target_ref": "x-misp-object--52b803c3-0c4c-414f-ab7f-61c009b4c3f9" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--17bc97c2-a714-4e0a-8269-78fd58200512", "created": "2018-03-13T13:55:46.000Z", "modified": "2018-03-13T13:55:46.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ffee8c30-fe29-4c86-9b73-30c567bf8611", "target_ref": "x-misp-object--6d666a98-8722-41c6-951c-010645d867ea" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--902f39ed-c549-4150-974d-281027f6e832", "created": "2018-03-13T13:55:47.000Z", "modified": "2018-03-13T13:55:47.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8e10aae3-e3c3-4fb9-8871-64897fb41a12", "target_ref": "x-misp-object--51bf0041-0608-40d2-a4b8-dac196a75558" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c04d29cb-0a1d-403f-a50a-2a8126894062", "created": "2018-03-13T13:55:47.000Z", "modified": "2018-03-13T13:55:47.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2a95ad9c-9614-4175-9c77-307846c62223", "target_ref": "x-misp-object--1c9db02b-c9a4-4f2d-8e66-4d1116798eb4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3802507f-0936-4c0f-be42-885abee548a6", "created": "2018-03-13T13:55:47.000Z", "modified": "2018-03-13T13:55:47.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e709461d-0ae6-468d-87eb-63960bd22851", "target_ref": "x-misp-object--30dce96c-9cdd-40ea-8945-b106b9b4a3b2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--82943dae-aa12-46ab-8939-df08b124f5ca", "created": "2018-03-13T13:55:47.000Z", "modified": "2018-03-13T13:55:47.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--21ebf0fd-7772-45af-b54c-abc5df09ea6f", "target_ref": "x-misp-object--90930896-570d-4f08-9767-9299e3e25f8c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ee9ee2af-4ee8-4c67-a908-4ff9d600ae27", "created": "2018-03-13T13:55:47.000Z", "modified": "2018-03-13T13:55:47.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--db0cef85-c247-4270-a64b-cfc6208435b7", "target_ref": "x-misp-object--617a92ab-8635-4f5e-80c9-a714809d0592" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--da9676d7-c950-4755-bdff-b17b48f98aff", "created": "2018-03-13T13:55:47.000Z", "modified": "2018-03-13T13:55:47.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--73918517-e510-4af0-a019-bf2bee56493f", "target_ref": "x-misp-object--49ea5f6c-b55f-42f9-aa76-b9d21ef849da" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2379a796-62d5-4886-a005-393e569fe5a8", "created": "2018-03-13T13:55:47.000Z", "modified": "2018-03-13T13:55:47.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--aef2b037-4ed7-4588-8cde-a018c637147c", "target_ref": "x-misp-object--a3c0c9b1-aa83-4af5-be53-f932ccf256bb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--310d89e5-392a-4692-b40f-8928dd16a0f0", "created": "2018-03-13T13:55:47.000Z", "modified": "2018-03-13T13:55:47.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--62d5dec4-9817-4b1a-bb14-609a1b6758a5", "target_ref": "x-misp-object--629868f3-c236-41a5-a066-de88f0bc5754" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1afd2c7e-906d-4d0f-8922-cd987ae62099", "created": "2018-03-13T13:55:47.000Z", "modified": "2018-03-13T13:55:47.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5453664b-9768-452f-80d9-b9a02391183d", "target_ref": "x-misp-object--588bfd9d-f8dc-46b6-8229-c99a0a18fa93" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--29576157-7e1d-493e-9eb2-b1297fc7ca83", "created": "2018-03-13T13:55:48.000Z", "modified": "2018-03-13T13:55:48.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--76e97e10-38c3-41c9-a84d-5614621238d5", "target_ref": "x-misp-object--281801c2-274e-4e56-9cce-7547583867fd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--52cbd4da-7d9e-4fd0-9f98-cb64adeccfb3", "created": "2018-03-13T13:55:48.000Z", "modified": "2018-03-13T13:55:48.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--993c1778-6454-40b9-bf98-e2c2993d751c", "target_ref": "x-misp-object--99fd2972-6ddc-4f44-86bf-cf3cdee3d8dd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--28b053a8-2fa8-4cbd-bf9e-8de3c8815d0b", "created": "2018-03-13T13:55:48.000Z", "modified": "2018-03-13T13:55:48.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--629083e5-c228-4a5f-ab26-905d65f29816", "target_ref": "x-misp-object--30fc814c-16cf-402d-8af4-b1b42f1f0670" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f0f4eaf6-9f4d-47ad-8cbc-0ca26ef253bf", "created": "2018-03-13T13:55:48.000Z", "modified": "2018-03-13T13:55:48.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--973eccaa-c84b-4e8a-acdc-20fb1cced3d0", "target_ref": "x-misp-object--3bc155aa-8c8a-4ad9-a170-238d59cd6423" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fd10ffda-7ee9-489c-862e-afcd9bbe1f65", "created": "2018-03-13T13:55:48.000Z", "modified": "2018-03-13T13:55:48.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9669a60a-a564-40cc-90f3-6a0619ddf84b", "target_ref": "x-misp-object--7472369f-9901-4c09-bfb1-244c7d70e65e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b24d0aaa-53a6-408c-a76c-4be8dad1189f", "created": "2018-03-13T13:55:48.000Z", "modified": "2018-03-13T13:55:48.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f9456adf-90ba-400d-ba2a-f34cd7f929d0", "target_ref": "x-misp-object--c51d359b-36fa-4a3f-8c24-f31adb564a9a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1d04cfa5-7eb7-4246-9ed6-93a980f822ba", "created": "2018-03-13T13:55:48.000Z", "modified": "2018-03-13T13:55:48.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--eb54ed4e-6811-4c83-8aee-c334fee7214c", "target_ref": "x-misp-object--4966f0ba-fea3-4837-b833-8f9a5d41d38e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c4d13c29-a1aa-44d5-9114-2639897b750c", "created": "2018-03-13T13:55:48.000Z", "modified": "2018-03-13T13:55:48.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5f4d9667-75ad-4a32-9e13-ad54428acb2b", "target_ref": "x-misp-object--a91d690d-70d7-4949-bfb0-6067f001a596" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b9441082-d7e8-44f9-b3f6-b7a397d8e6de", "created": "2018-03-13T13:55:48.000Z", "modified": "2018-03-13T13:55:48.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9041116a-b6b5-4d5c-a565-d6178035272b", "target_ref": "x-misp-object--848f6b87-3abc-4578-a29d-3d36b95393df" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--76a2492b-f9dc-4058-8e36-99965845d0d6", "created": "2018-03-13T13:55:48.000Z", "modified": "2018-03-13T13:55:48.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9f28f790-484f-41c7-98fd-19c53a5784ad", "target_ref": "x-misp-object--ccefa011-af8a-4a21-ae83-32e24a2bcf5d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b6ecfe4a-7173-4546-8bb1-657634c9a96d", "created": "2018-03-13T13:55:49.000Z", "modified": "2018-03-13T13:55:49.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--20a1faef-5b03-4328-a877-a6d9ecce874d", "target_ref": "x-misp-object--d3df38dc-94a4-490a-a393-30f28bb71c2a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b06c90a7-fa1d-4f7a-aca2-77ef1b4f7263", "created": "2018-03-13T13:55:49.000Z", "modified": "2018-03-13T13:55:49.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--62f011a5-158a-4e17-9274-373a8afa7f89", "target_ref": "x-misp-object--fd076d81-b315-4442-825d-b43dd7931e58" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b9e1b6f4-d16e-46f7-9ee3-14250e6ff6c3", "created": "2018-03-13T13:55:49.000Z", "modified": "2018-03-13T13:55:49.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2910e51e-9648-4e47-afdf-a4e987e19b36", "target_ref": "x-misp-object--de7ed8dc-8696-458b-bb57-f9f9108072ec" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e12736a0-f1a3-4b61-baf7-4586edad4c7d", "created": "2018-03-13T13:55:49.000Z", "modified": "2018-03-13T13:55:49.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d1784ba3-1ef0-4d79-8079-c9dc92251090", "target_ref": "x-misp-object--122ea312-54ee-42c9-9246-5a1b4c5d6e9d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6a240ab3-2be5-4307-a365-36ce9d546092", "created": "2018-03-13T13:55:49.000Z", "modified": "2018-03-13T13:55:49.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f30501a4-1ca7-4609-957b-15efbfab4c35", "target_ref": "x-misp-object--d9686b2d-97a4-4279-908e-a465007070a0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9c7be638-8e16-4435-b4df-add21e3c103b", "created": "2018-03-13T13:55:49.000Z", "modified": "2018-03-13T13:55:49.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6f94cdef-c5a9-409d-9fa3-8a13133ff47f", "target_ref": "x-misp-object--4012a76c-de18-4390-a286-2c83696b393d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--12a604fb-7e1d-4e06-b0d7-dd378163c9c2", "created": "2018-03-13T13:55:49.000Z", "modified": "2018-03-13T13:55:49.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4b6c97d5-3fe1-4419-bf6b-f179e663bcd1", "target_ref": "x-misp-object--9fa6c908-2ff0-4298-aa58-9fed29b6621c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--20138853-5d1e-4370-bea1-4769d43931d5", "created": "2018-03-13T13:55:49.000Z", "modified": "2018-03-13T13:55:49.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5f5a9bef-cbc2-4048-a584-02fe6b323301", "target_ref": "x-misp-object--d4ce528e-6e53-4462-8b4d-bf43bcf7a122" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e71e8c17-3022-43fa-86b7-1ac744cd7215", "created": "2018-03-13T13:55:49.000Z", "modified": "2018-03-13T13:55:49.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3c44b011-cea0-49e8-b582-fad55d1d8af1", "target_ref": "x-misp-object--d9f6f916-1093-437b-9010-23a6d7ba2770" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0baaa1fb-3370-4e48-ae8c-52ce601c0604", "created": "2018-03-13T13:55:50.000Z", "modified": "2018-03-13T13:55:50.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--262143f5-8e2c-48f0-a7ff-98463168dc27", "target_ref": "x-misp-object--b1bd6e18-7266-4a67-b549-1177d939703d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--77aae7d8-8290-424f-9b18-96829830981d", "created": "2018-03-13T13:55:50.000Z", "modified": "2018-03-13T13:55:50.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4778b0bb-ca98-4bd7-8f8a-5d408f3cff9e", "target_ref": "x-misp-object--4006abea-7694-4809-ad2f-f5b1d0b8648a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--564ffd7d-ab00-446a-ae92-2df62c9b67b8", "created": "2018-03-13T13:55:50.000Z", "modified": "2018-03-13T13:55:50.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c8f23cd0-337b-4520-b4d3-c7b053601507", "target_ref": "x-misp-object--17da1ccf-d4c1-4428-8404-8d3659d59793" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--251538a5-a7a4-43d0-b9b4-b334c3ac73b1", "created": "2018-03-13T13:55:50.000Z", "modified": "2018-03-13T13:55:50.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b01eed1e-c2f3-4a55-ae9e-c38e8d385f0a", "target_ref": "x-misp-object--b544c25d-094a-4b2b-a6dd-14b6ace52836" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d3931fd9-4a76-4adc-9cd7-0077505341dd", "created": "2018-03-13T13:55:50.000Z", "modified": "2018-03-13T13:55:50.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7fe8a7d6-0855-42f6-9a14-b2824acfb3b4", "target_ref": "x-misp-object--42755064-ba05-4f91-b78f-689be27b717e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0cab40ac-48a2-4f86-b3a4-517141c07439", "created": "2018-03-13T13:55:51.000Z", "modified": "2018-03-13T13:55:51.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7515eaf4-b764-46a3-b4bb-a9dd4669c17e", "target_ref": "x-misp-object--fc459030-58b1-4629-8287-71eb17a46f1f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--11d7f080-ae64-453f-9e65-877920c57d47", "created": "2018-03-13T13:55:51.000Z", "modified": "2018-03-13T13:55:51.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0c710fd7-5c24-4156-80af-9ce1133f1b34", "target_ref": "x-misp-object--59ee90d1-bae4-42a5-9686-5f2ad4cb8007" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e773c0c8-0917-490c-9584-8bef593418d9", "created": "2018-03-13T13:55:51.000Z", "modified": "2018-03-13T13:55:51.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1f4e9c0c-d4b9-4b41-b50e-95a86e12635f", "target_ref": "x-misp-object--c60414fe-d8a1-485f-b326-ec39137346c4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ef1e6edc-09d8-41b5-aec0-37aef42f1633", "created": "2018-03-13T13:55:51.000Z", "modified": "2018-03-13T13:55:51.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--772a44aa-5648-43da-ae46-a43b0e51dede", "target_ref": "x-misp-object--8076f407-c7c6-42e5-9901-5ea7dca9e02c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--810ae5b4-b4f0-4cd2-8fca-11b2472f73e9", "created": "2018-03-13T13:55:51.000Z", "modified": "2018-03-13T13:55:51.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3842366a-678d-443f-83ba-e2523a409506", "target_ref": "x-misp-object--0c7561b8-109e-4cde-85ee-0c5ceaa66987" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--25c6a6e1-95b2-4ca2-917f-29fa63e458af", "created": "2018-03-13T13:55:51.000Z", "modified": "2018-03-13T13:55:51.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6e33ec1b-4c4b-4ff2-9df3-e0ef2cf0d557", "target_ref": "x-misp-object--68bfceef-61e7-40b2-8baf-9191f74d200c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f63540f6-c3b9-4ac3-9fca-41f21059e4f0", "created": "2018-03-13T13:55:51.000Z", "modified": "2018-03-13T13:55:51.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b41008c1-0bec-4725-b8fa-fb41541dedc0", "target_ref": "x-misp-object--e7aedbef-df58-4fa7-b32a-34eb2c0ed4e5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3b5331ae-d7cd-4cfa-b77c-dcbd646abf3a", "created": "2018-03-13T13:55:52.000Z", "modified": "2018-03-13T13:55:52.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a0ff86b1-25e6-4093-8971-dccc063f05a8", "target_ref": "x-misp-object--724bc7ba-ba88-4e5d-9c40-7676621f8735" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5232bd7d-4001-4689-a684-f5265aa0ca5d", "created": "2018-03-13T13:55:52.000Z", "modified": "2018-03-13T13:55:52.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1373fe1f-de01-4475-915b-6851db2f39e4", "target_ref": "x-misp-object--fc7f1e60-0b74-422a-809b-d51ccf402c0e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0874c7f6-f084-41d8-bca3-66fe7270de74", "created": "2018-03-13T13:55:52.000Z", "modified": "2018-03-13T13:55:52.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c45f14db-dfbd-4555-b390-2276e6ff1ad2", "target_ref": "x-misp-object--fae7c364-8729-429b-9ea9-3b31af0f3ea5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2dab95c8-72ed-418d-9f80-6c0eaf4ef06f", "created": "2018-03-13T13:55:52.000Z", "modified": "2018-03-13T13:55:52.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--56a2d91c-c23b-4c5e-b2e3-921244e87225", "target_ref": "x-misp-object--1e6b86c2-a47c-487a-9f37-325383622e1d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--aebe7b40-7fb6-472e-9aaf-37636e51f15d", "created": "2018-03-13T13:55:52.000Z", "modified": "2018-03-13T13:55:52.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6d17c059-317b-40e2-9085-4f8286e2d10e", "target_ref": "x-misp-object--00d27731-8a04-43ba-944f-d93082b05bce" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3c3fbaf8-9a1e-4ce3-ada5-4c33f1dafc99", "created": "2018-03-13T13:55:52.000Z", "modified": "2018-03-13T13:55:52.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a5a9364c-78a9-48e7-9960-74cafd72c762", "target_ref": "x-misp-object--8812bcfd-652a-48f9-8ce0-d0859f8a7d74" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--621594f9-76eb-4ded-937e-294a6f902029", "created": "2018-03-13T13:55:52.000Z", "modified": "2018-03-13T13:55:52.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--cfdebb5e-9bed-4110-91e1-967541c218d5", "target_ref": "x-misp-object--088a12ae-cb7c-4e19-bf34-de6c31c42421" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1e2f3006-dc94-4904-842a-e99e4302b43d", "created": "2018-03-13T13:55:52.000Z", "modified": "2018-03-13T13:55:52.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8cfdb710-e0eb-4aa0-be7f-4bef7c057f48", "target_ref": "x-misp-object--50d32b71-58f6-49bd-950c-8201f8c8f6a0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--68307315-d9eb-4cf7-ab53-09cb6460cfd4", "created": "2018-03-13T13:55:52.000Z", "modified": "2018-03-13T13:55:52.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0ee0151f-da7d-4d9f-8d67-74dc297b1ac7", "target_ref": "x-misp-object--afef20ad-8f41-41fd-ab24-c13d4bb81db2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--731f1f72-b8b0-4cec-be68-8b12d429ef0a", "created": "2018-03-13T13:55:53.000Z", "modified": "2018-03-13T13:55:53.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--66c51f09-728f-4bbc-a2f0-8fd2dd9ee34c", "target_ref": "x-misp-object--94c29569-4c2f-4eca-83ea-71b34b2f04ac" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--76e8374d-cce8-4dd5-ac12-b91d5c66d800", "created": "2018-03-13T13:55:53.000Z", "modified": "2018-03-13T13:55:53.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8ba4601c-07fc-4c31-b409-70f55daec9da", "target_ref": "x-misp-object--e0e6c464-9727-4e62-99a8-d2d896ef3be0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--59e0f33c-cede-4ba8-b959-770ae1f13e71", "created": "2018-03-13T13:55:53.000Z", "modified": "2018-03-13T13:55:53.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c7f95bca-d452-4ca5-b2fd-81284eefa29a", "target_ref": "x-misp-object--95bd6a8c-2c13-44dc-a176-04b903e55468" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7cfc3129-0289-4360-bec6-e1061204a236", "created": "2018-03-13T13:55:53.000Z", "modified": "2018-03-13T13:55:53.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--895e6d73-cc04-4d7d-a74f-1c79d68cc85d", "target_ref": "x-misp-object--ba96f218-b01d-4fb3-986e-4a4b129d501a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8b3453f2-0c8b-485c-9695-4cf1ef174f71", "created": "2018-03-13T13:55:53.000Z", "modified": "2018-03-13T13:55:53.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a18a3d72-f1c0-40f0-9281-25c93d8002c7", "target_ref": "x-misp-object--d673e058-bd6f-4588-b64a-5f26648b833f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c1f94184-8cce-4752-ab3d-3058c7da8f31", "created": "2018-03-13T13:55:53.000Z", "modified": "2018-03-13T13:55:53.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1a981d65-59bc-4a14-81a1-008f4c77159a", "target_ref": "x-misp-object--ad7412ca-ba99-4dc1-9098-1b14d7898562" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--bbdb3534-30df-4453-bc8f-ee86c53d3c06", "created": "2018-03-13T13:55:53.000Z", "modified": "2018-03-13T13:55:53.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f6601087-35c3-4239-85b2-25f4a4c9c1f0", "target_ref": "x-misp-object--f1915336-fa1d-4500-931f-5368fbc727d4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--149efe0c-8a9c-4254-9e3a-6e49adbf5f95", "created": "2018-03-13T13:55:53.000Z", "modified": "2018-03-13T13:55:53.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--abf60cec-d36a-4744-b7a1-a33e5763a9c4", "target_ref": "x-misp-object--32ea0688-10d4-4123-b4c6-d68fb5cc55d4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f6075e82-a5a0-4d8c-925b-500cd92dc2cd", "created": "2018-03-13T13:55:53.000Z", "modified": "2018-03-13T13:55:53.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a8aecb74-f7d5-4f56-9dc7-3c00ba2f4b0d", "target_ref": "x-misp-object--f355561d-a7fa-4896-be8c-1f8274815354" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2186acc5-9422-4da4-a30f-57fa73a80272", "created": "2018-03-13T13:55:53.000Z", "modified": "2018-03-13T13:55:53.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a9d8f073-dd7a-4e9b-a0a7-04598ce32926", "target_ref": "x-misp-object--10380065-18d9-4ca8-8cb4-dad38fdd929d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2833c2bc-b90a-4320-9867-dbd2b9d09478", "created": "2018-03-13T13:55:54.000Z", "modified": "2018-03-13T13:55:54.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7638c728-3089-4a20-af0a-b37900bc1f1d", "target_ref": "x-misp-object--86f66db8-becb-45ae-b0f3-e3340cd5d19a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1d0527e6-4d98-400a-bd29-7c884dca5156", "created": "2018-03-13T13:55:54.000Z", "modified": "2018-03-13T13:55:54.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7f886d78-e6f7-4ecd-8828-e9693e314aa0", "target_ref": "x-misp-object--0f3c8eab-f129-49da-9ed7-cc8b7f1b09f0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--72cd7467-999a-407a-928c-c65bd4e1656d", "created": "2018-03-13T13:55:54.000Z", "modified": "2018-03-13T13:55:54.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--51f66ea4-bd23-495b-be2c-64962e187550", "target_ref": "x-misp-object--ff35fc80-aed9-44b8-bf9a-04ae04bb9b29" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--69858a14-684c-473f-97f9-960bfd7bf76c", "created": "2018-03-13T13:55:54.000Z", "modified": "2018-03-13T13:55:54.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--93cdfd6c-153f-458f-8b4d-6d3eea4d85fa", "target_ref": "x-misp-object--25d08574-096e-4a9b-b9cc-e292aff3160a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--73e4957c-70a8-4272-9fb6-d25a270b3e16", "created": "2018-03-13T13:55:54.000Z", "modified": "2018-03-13T13:55:54.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d2244ec7-b833-45ee-b46d-46d0eb8821a6", "target_ref": "x-misp-object--0dd974d2-228a-4efd-9c80-5c3ebec6afe2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7c92d8fc-492b-40aa-9f71-916dc1a2c309", "created": "2018-03-13T13:55:54.000Z", "modified": "2018-03-13T13:55:54.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a252e7e6-4210-4a0e-af70-808685490bf0", "target_ref": "x-misp-object--3fda77bd-6a6a-4fdb-a784-0569bd5b8bc4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--652da695-06d7-400b-a5b8-14179e1e8a69", "created": "2018-03-13T13:55:54.000Z", "modified": "2018-03-13T13:55:54.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--652791f2-58a3-4bc2-9127-eee90e5777fc", "target_ref": "x-misp-object--245b7bed-15e3-4235-86bd-27e0d9bc6c46" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--bee8df9b-2a7d-48ae-ae7c-2bcf0fcd20b2", "created": "2018-03-13T13:55:54.000Z", "modified": "2018-03-13T13:55:54.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bd4872e3-93f3-4a82-85ab-0fef4dc1a473", "target_ref": "x-misp-object--47225078-5904-4fc7-96ae-03e630f628e7" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--246decb4-ed4c-4347-a945-fa541843e0da", "created": "2018-03-13T13:55:54.000Z", "modified": "2018-03-13T13:55:54.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7724b584-9fbf-4690-8824-571ca40e8647", "target_ref": "x-misp-object--a9700a79-b809-4626-9a0f-1b5e30547578" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0b5ca8c7-f5ad-420e-84ae-ed78508c2220", "created": "2018-03-13T13:55:54.000Z", "modified": "2018-03-13T13:55:54.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--eccc55d5-a165-4f16-8dba-993df6d0c16d", "target_ref": "x-misp-object--c14e1628-941c-43c0-81ef-0b8bf8e8db3e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--87723027-ddce-4fa0-b260-083e0b1a2bcc", "created": "2018-03-13T13:55:55.000Z", "modified": "2018-03-13T13:55:55.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--da83d80a-c5b2-4f00-b78f-bd6cea6c47be", "target_ref": "x-misp-object--e7be8927-c465-4b2e-bfcc-68a41eae297a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--291d68ec-4910-4811-9aa0-fa2ca4742960", "created": "2018-03-13T13:55:55.000Z", "modified": "2018-03-13T13:55:55.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--de30c258-e3ff-4103-90f0-66b263006c0b", "target_ref": "x-misp-object--c9f224ab-0c81-4deb-9160-85f96bc624c2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--708345b6-3138-4d2f-ace2-51023e97ad7b", "created": "2018-03-13T13:55:55.000Z", "modified": "2018-03-13T13:55:55.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e4f6dfdc-fb92-4812-8c6d-91b7548ebadf", "target_ref": "x-misp-object--f83784d1-6a08-4009-a46e-4aed15ff5dee" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--24abfa04-0575-4907-a4bf-930d26036fb2", "created": "2018-03-13T13:55:55.000Z", "modified": "2018-03-13T13:55:55.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5a0cdfe2-1650-41fa-ac1f-99afa14cc188", "target_ref": "x-misp-object--b3785c90-1c5f-4739-8cf1-31e946583359" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9c0d9903-1174-4e1e-9355-ec1309e0d437", "created": "2018-03-13T13:55:55.000Z", "modified": "2018-03-13T13:55:55.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--da10673d-4b03-473f-943b-e68b51a49372", "target_ref": "x-misp-object--c0f2a053-934c-4be9-ad1d-7249dfef9301" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fb5cd5cc-87d1-4aeb-acd1-33e2949a1080", "created": "2018-03-13T13:55:55.000Z", "modified": "2018-03-13T13:55:55.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--cb0ffcf7-6e1a-4bc5-b72e-b1c50a4c072a", "target_ref": "x-misp-object--c0d442d4-72b6-47cb-b4b8-18744a4fd84d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--96ddd943-8870-434b-a13a-9d1b317059d1", "created": "2018-03-13T13:55:55.000Z", "modified": "2018-03-13T13:55:55.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4272cdd1-73f2-4b9a-a8b5-64d3a1d7dfd0", "target_ref": "x-misp-object--857ca1d6-7992-4e86-9a8a-9baf9005bbd9" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--aa987ba4-a6a8-47b3-b97f-3eb7c1248c7e", "created": "2018-03-13T13:55:55.000Z", "modified": "2018-03-13T13:55:55.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2f2d7190-59a8-4a22-b2af-ac312b91bfe0", "target_ref": "x-misp-object--df56eb90-6fe6-4dc2-86c7-0c1134d65812" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--150026c6-1644-4d23-8ce6-d6d14b257079", "created": "2018-03-13T13:55:55.000Z", "modified": "2018-03-13T13:55:55.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2701b8c8-6625-4f06-a88f-c78f56165a61", "target_ref": "x-misp-object--9f4f8732-0f86-487d-b2f5-1d2d89aef0bd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7d5a9949-9d23-4784-ad91-72331467fdd6", "created": "2018-03-13T13:55:55.000Z", "modified": "2018-03-13T13:55:55.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--93b95f15-4cb7-419f-841c-450ac3d2fcf6", "target_ref": "x-misp-object--048e1c5f-6a94-4dd9-bbf7-eda1802b6d9c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--dfdd8e2a-1018-4c8e-aef0-93367d65033c", "created": "2018-03-13T13:55:56.000Z", "modified": "2018-03-13T13:55:56.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--be1441ae-b2e5-41ed-abdd-414809f6352f", "target_ref": "x-misp-object--3741aec9-519d-4649-ad8a-549d2450e256" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6d965980-dcb0-41d9-82ec-b3bccf55f3be", "created": "2018-03-13T13:55:56.000Z", "modified": "2018-03-13T13:55:56.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f231a6ea-f8b4-43f8-adac-96e31854da2c", "target_ref": "x-misp-object--e5f7cc1c-cd7e-49f5-9d23-96945164180e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2f838041-d644-40b9-84ec-6c17bea8a4e9", "created": "2018-03-13T13:55:56.000Z", "modified": "2018-03-13T13:55:56.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f9a65653-53de-44fd-a416-29aeb4cf5f1e", "target_ref": "x-misp-object--19789499-f9e3-4415-afb9-7dee60e37880" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--09286856-5c2a-46e8-9a5f-64aa40869f2f", "created": "2018-03-13T13:55:56.000Z", "modified": "2018-03-13T13:55:56.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--091a7f76-14d6-48df-86fc-76bf406a81a9", "target_ref": "x-misp-object--fc99724e-fb1c-49c1-a876-021d95449e91" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8208566d-3b8b-4a0f-90c2-98bda15c6ac9", "created": "2018-03-13T13:55:56.000Z", "modified": "2018-03-13T13:55:56.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--edc558da-e5d9-484e-a89c-2d4286e33de7", "target_ref": "x-misp-object--a567af95-f7a3-4bf2-baa3-270f681e5322" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5d735471-e678-49c5-aea8-fb02d8d9ca62", "created": "2018-03-13T13:55:56.000Z", "modified": "2018-03-13T13:55:56.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ad876176-ecb0-4443-a1e3-3474fea95c7c", "target_ref": "x-misp-object--4c0aa304-4439-4634-ab20-fa7a819e4cfb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a5aec87e-9553-4be4-be5c-adf8135f9d35", "created": "2018-03-13T13:55:56.000Z", "modified": "2018-03-13T13:55:56.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--27853edd-8b95-4a9c-8fd5-256adb3e5da6", "target_ref": "x-misp-object--4a39f8b7-6642-4a32-aa2c-511de3de0ae6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8512941e-c05b-4f29-8c38-2e6bb8cd4a50", "created": "2018-03-13T13:55:56.000Z", "modified": "2018-03-13T13:55:56.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--63998fb4-3796-4b69-bbb5-c786f85c6e24", "target_ref": "x-misp-object--77335a35-58f3-4736-8e65-9d43eadd3255" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3aa0d7fa-a4e2-47fb-bee0-f3eab269d863", "created": "2018-03-13T13:55:57.000Z", "modified": "2018-03-13T13:55:57.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f501ee7d-5468-4059-a745-dc1f392e6a44", "target_ref": "x-misp-object--8482a386-b5b8-479a-974a-219fe749b1ab" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--36228c94-1de7-4eb1-82eb-23343fd34861", "created": "2018-03-13T13:55:57.000Z", "modified": "2018-03-13T13:55:57.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ebfa55c6-2e68-4f35-a2f3-060799e22095", "target_ref": "x-misp-object--a3bb6a50-5123-498e-8f1a-6923b54b0b35" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--67416310-df01-4fef-aa96-8ab7af93fe8a", "created": "2018-03-13T13:55:57.000Z", "modified": "2018-03-13T13:55:57.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2316025b-81d4-4611-8420-62597b2163f7", "target_ref": "x-misp-object--436f3cd9-f66e-4d35-b0c3-ba8c39c5a0c4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2acbdb3a-ec13-4e0f-80a4-d75621b7330c", "created": "2018-03-13T13:55:57.000Z", "modified": "2018-03-13T13:55:57.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--dc57f819-a4ca-4824-ba9d-e6d0e9f78b9d", "target_ref": "x-misp-object--37f56d93-b168-44cb-90c9-e245c6eee85a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9f20571d-0bc3-4f4b-90ae-45e1a0d94543", "created": "2018-03-13T13:55:57.000Z", "modified": "2018-03-13T13:55:57.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4f1fd255-9d15-43ec-a8b6-5fdf0abbd1c5", "target_ref": "x-misp-object--18efd0c2-3813-4e9f-bf69-330dea779353" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--28b454eb-e4e8-4a37-87f1-31a92cba486f", "created": "2018-03-13T13:55:57.000Z", "modified": "2018-03-13T13:55:57.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8f789d00-5c20-45f6-8091-834ea7f79fcd", "target_ref": "x-misp-object--74d6bbc6-5b6e-485e-b40f-e0076046c307" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7791a1a6-4112-4ceb-ac7c-de1adc97a966", "created": "2018-03-13T13:55:57.000Z", "modified": "2018-03-13T13:55:57.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--318e9442-266a-42df-9bcb-57af40dc6fee", "target_ref": "x-misp-object--9f4cb389-a3be-4918-8887-595689e68ba0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3649f154-9775-43b5-9b7e-db98ba1caa66", "created": "2018-03-13T13:55:57.000Z", "modified": "2018-03-13T13:55:57.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6212c88a-a171-457e-bce5-e495cb75bcd6", "target_ref": "x-misp-object--8d1e8e66-f43c-4d3f-8b88-326769b2dadd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7ad78b36-d89c-45fd-8c97-e8da1e65175b", "created": "2018-03-13T13:55:57.000Z", "modified": "2018-03-13T13:55:57.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b564d217-c2db-44d8-b069-916f0fee7fc7", "target_ref": "x-misp-object--2693cbb3-ac2c-476e-a4bf-b199c7e88878" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--05523e45-2f51-4880-8fff-12f28c98ab21", "created": "2018-03-13T13:55:57.000Z", "modified": "2018-03-13T13:55:57.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3bc0a925-001a-4ec0-b662-c6ffdfa883da", "target_ref": "x-misp-object--9c4a8abf-36e5-45f2-9950-acb6fc6d6d8d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--243ed071-b0ba-48ef-a03e-be4494801ec0", "created": "2018-03-13T13:55:58.000Z", "modified": "2018-03-13T13:55:58.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--de573c2e-d1b7-4454-830b-ee0de6ffebe7", "target_ref": "x-misp-object--2b361753-16d6-4b91-aa83-2241be1c2111" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fd0337dd-8e74-4092-a4ee-35ff5f667816", "created": "2018-03-13T13:55:58.000Z", "modified": "2018-03-13T13:55:58.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f845f0d3-8a14-4cd0-ac52-b68a45ad6bd1", "target_ref": "x-misp-object--22ac03b3-05b2-4cb3-b1cf-06a04d09b191" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--385c0e15-c116-4359-ad6f-37c08521a25a", "created": "2018-03-13T13:55:58.000Z", "modified": "2018-03-13T13:55:58.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b7dc6423-6d05-411f-ab96-1f5fe5bff960", "target_ref": "x-misp-object--99910c76-477b-4cf0-bae3-dd9aabed6f4c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3c23bc48-f3db-49ee-bff9-6315bcd01786", "created": "2018-03-13T13:55:58.000Z", "modified": "2018-03-13T13:55:58.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--db1db06e-a0ec-4bb8-b529-d8eb867e24c4", "target_ref": "x-misp-object--5fc6ede9-b781-4eb4-8c6a-a47a025901ef" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3a40d2ca-43f6-4132-a8db-141fe009273d", "created": "2018-03-13T13:55:58.000Z", "modified": "2018-03-13T13:55:58.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--42066cdc-d515-4c5e-b536-6403bd2fa1b5", "target_ref": "x-misp-object--869f01f6-7bb3-44b4-bc9e-8b736da289fa" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5c10a998-bbbf-43e5-9689-6a05d629eee4", "created": "2018-03-13T13:55:58.000Z", "modified": "2018-03-13T13:55:58.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b2a4407f-5430-4c80-bf8f-507f234cdf38", "target_ref": "x-misp-object--081ea566-bd34-49d7-be26-ccbb3ad585d1" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7284d20e-e9fb-49c5-b85d-14453664ff8a", "created": "2018-03-13T13:55:58.000Z", "modified": "2018-03-13T13:55:58.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4baac2f7-b640-49ea-aa37-60ae3a4b7e66", "target_ref": "x-misp-object--93f77b86-ed4f-4313-8c22-6010b7795a8d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--bab00b15-3daa-4dfb-999e-406c32016d3f", "created": "2018-03-13T13:55:58.000Z", "modified": "2018-03-13T13:55:58.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7baf9480-e568-41e6-a1f1-fff7d516fbb1", "target_ref": "x-misp-object--b8d85b22-76dc-4882-85ac-0fb0f74b754f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3b316dc8-2fb6-43e5-94a1-5340ff1f4f1e", "created": "2018-03-13T13:55:58.000Z", "modified": "2018-03-13T13:55:58.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--70733fd0-6c28-4129-980c-8ff97d139d43", "target_ref": "x-misp-object--808e6a5f-a93e-48f1-8678-d5f32b61f516" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4a56d6aa-b1e9-4b02-bdb8-b6da6a979f3b", "created": "2018-03-13T13:55:59.000Z", "modified": "2018-03-13T13:55:59.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--86a9886d-1f0c-48e5-978c-8f96df99efed", "target_ref": "x-misp-object--980fe535-bfc5-45db-979a-1c6e45bfa4b4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--eba20770-c48d-499b-99c8-b1be06ec7eb5", "created": "2018-03-13T13:55:59.000Z", "modified": "2018-03-13T13:55:59.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--991239b6-a59d-4891-9365-3297334f53b8", "target_ref": "x-misp-object--e5931a6d-c9d6-4c85-9184-45c54d0896e5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--12a46e3e-b70f-4dc6-9cdc-7bf3a0902d35", "created": "2018-03-13T13:55:59.000Z", "modified": "2018-03-13T13:55:59.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--af070041-9ff6-4592-b8f9-c8321cb360ab", "target_ref": "x-misp-object--3b6371b2-89d5-4271-ada4-05f54fd4ceb7" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1a7ca46b-2ec5-469e-9921-7c2e780cedeb", "created": "2018-03-13T13:55:59.000Z", "modified": "2018-03-13T13:55:59.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e518371a-6ff1-4160-86db-52fd485c75ed", "target_ref": "x-misp-object--16b70a36-22ec-44de-9284-c8513068cae6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--079edeae-5b53-47a8-94b1-f7723afb9d98", "created": "2018-03-13T13:55:59.000Z", "modified": "2018-03-13T13:55:59.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--774d6ed8-303c-4a84-935d-f3ac619f4e8f", "target_ref": "x-misp-object--dc1da038-6340-42d1-ba26-176fe9bcded0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--77e48b74-8849-4a67-9e87-6666d6daab0e", "created": "2018-03-13T13:55:59.000Z", "modified": "2018-03-13T13:55:59.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f6f9fee4-876e-4765-ac1f-923a8e449811", "target_ref": "x-misp-object--6c106bd5-9842-4461-b8dd-0faa223d2c68" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--215bb729-17f1-4a94-92d6-ebf0f3d49849", "created": "2018-03-13T13:55:59.000Z", "modified": "2018-03-13T13:55:59.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ef7ab321-e2e2-45d6-a76b-ed61d6ccbdba", "target_ref": "x-misp-object--fccef241-584e-4a8c-bcac-44550ac946a0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--89e5e7bf-f836-4d5e-ab38-c6c353d59e2c", "created": "2018-03-13T13:55:59.000Z", "modified": "2018-03-13T13:55:59.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--972390dc-b051-4c4f-952a-2daca6c94e2a", "target_ref": "x-misp-object--6d2857f8-cde7-49a7-86f7-27711cde2de0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--73650400-4943-4c13-b767-98aeaf8098d2", "created": "2018-03-13T13:55:59.000Z", "modified": "2018-03-13T13:55:59.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6c18de88-4e54-4aca-8333-7b6002fc6581", "target_ref": "x-misp-object--3fe466f9-e2a4-4cd9-85fe-b5985c458e79" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5c131989-5528-45d3-be76-6f868917f9a3", "created": "2018-03-13T13:55:59.000Z", "modified": "2018-03-13T13:55:59.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c0777536-9c34-4420-ad25-8a811bf2948c", "target_ref": "x-misp-object--eeac1674-b2c3-403a-af56-098d62b62f9d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--da450201-5e92-4ace-a4df-a4e3a8cee101", "created": "2018-03-13T13:56:00.000Z", "modified": "2018-03-13T13:56:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ad0bbb06-2204-4a91-a97c-85d1f2c8bedc", "target_ref": "x-misp-object--c511bbf9-ee03-472f-9275-86e54f87e603" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1907aa7e-7553-4992-87f5-fdb6718e2ba3", "created": "2018-03-13T13:56:00.000Z", "modified": "2018-03-13T13:56:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--181cb412-06ff-42e2-9e5c-f3b5a7f11780", "target_ref": "x-misp-object--d09085d8-c050-4efa-8e91-586e9207ef3c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d46ba3c0-f60e-4eea-ba07-54c55679b968", "created": "2018-03-13T13:56:00.000Z", "modified": "2018-03-13T13:56:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7fadae6d-0f96-456c-8717-ce5168fcd964", "target_ref": "x-misp-object--5978498f-332b-46d5-ac8b-5da2f33ba5fc" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0ba006f7-a968-4ea6-b6a8-91e38c12270f", "created": "2018-03-13T13:56:00.000Z", "modified": "2018-03-13T13:56:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--84d40159-8f0c-400c-8d61-34ea3ee11fd5", "target_ref": "x-misp-object--fa3049b4-4fb2-4010-b3d6-df251f5e601d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ec86da64-d07c-428d-b95e-761ff0a7a042", "created": "2018-03-13T13:56:00.000Z", "modified": "2018-03-13T13:56:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--97613f9a-68d6-4e2b-92a4-99963309ce91", "target_ref": "x-misp-object--be1dbba5-f49d-4dc9-b130-19e084d25584" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e5b02dd1-35a9-408b-ae54-68c1e3adb54d", "created": "2018-03-13T13:56:00.000Z", "modified": "2018-03-13T13:56:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9850420f-b885-45a9-a6e2-af2380c164a7", "target_ref": "x-misp-object--09920e57-e715-4c54-b158-9a9ee4b11723" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--318ecf16-3602-49e1-82e7-2dc107c4c137", "created": "2018-03-13T13:56:00.000Z", "modified": "2018-03-13T13:56:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e4a8088c-bb92-4cff-9775-8f2369d9c9d7", "target_ref": "x-misp-object--5850fabb-73d0-4f76-a406-a6f7e27b0b09" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--eaff9f57-f3fe-43b1-95f2-d76f20cd185a", "created": "2018-03-13T13:56:00.000Z", "modified": "2018-03-13T13:56:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e60f450e-6f03-470e-9126-dc098b8138a0", "target_ref": "x-misp-object--eef7f7bc-bb25-4b04-9930-1d76137be36e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--973b1dc6-555b-4b59-8f9b-36a96dce97e6", "created": "2018-03-13T13:56:00.000Z", "modified": "2018-03-13T13:56:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--110e5750-cf74-4fe0-9af7-59757472d6e4", "target_ref": "x-misp-object--c2a69426-1e1e-4522-b6dc-a3833d75a33e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--da500e9f-a4f1-4d47-9a26-70060cbe0fe0", "created": "2018-03-13T13:56:00.000Z", "modified": "2018-03-13T13:56:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--60afce5d-2b5c-4c36-ab17-ab9544a2744e", "target_ref": "x-misp-object--b80f6804-4169-4522-825b-985b9349fabc" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2ff6878a-60cd-4bb9-b8ca-7b2af0cbadb4", "created": "2018-03-13T13:56:01.000Z", "modified": "2018-03-13T13:56:01.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--20408dac-7c98-4bcf-bd33-a53de3436da3", "target_ref": "x-misp-object--9a547937-9c10-4da0-8147-fa1e898ed8bc" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9a009583-1931-4e41-ac12-d7c1d32f7f85", "created": "2018-03-13T13:56:01.000Z", "modified": "2018-03-13T13:56:01.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b9ebd188-91d8-4229-8b64-13d8daa59f3e", "target_ref": "x-misp-object--d6008b30-2b4b-4d67-b609-7d7a5604ab1d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6dc8ca8f-2877-49c9-8fe8-cfbba8a66978", "created": "2018-03-13T13:56:01.000Z", "modified": "2018-03-13T13:56:01.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--682d3605-86dd-4f7e-80f2-a99ad1dd4e70", "target_ref": "x-misp-object--d94c34c7-d78d-4d62-82e9-911bc6d298bd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a37e3f5b-6b5c-432b-add1-096115902394", "created": "2018-03-13T13:56:01.000Z", "modified": "2018-03-13T13:56:01.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1a99a2de-2373-4621-a8fb-3810a2d1e0b3", "target_ref": "x-misp-object--1d9c8849-48b1-4c5a-86c1-23c30aa5bd85" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--eea784f6-6460-4a02-91df-a82bfadef313", "created": "2018-03-13T13:56:02.000Z", "modified": "2018-03-13T13:56:02.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--98b8fd89-339b-4f7a-ab5b-9c386741f7f4", "target_ref": "x-misp-object--a255438b-ec32-4257-8de6-dc7a054f4126" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0a4726b0-70e6-4a33-b222-3b021b0427a5", "created": "2018-03-13T13:56:02.000Z", "modified": "2018-03-13T13:56:02.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--639a5e0f-c87f-4c39-bb1f-0443c6fe085f", "target_ref": "x-misp-object--b70cf9ce-61c3-4cc0-84d1-d2848d3e98e8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1fd3b7b8-5588-4045-9494-2e682ced28e3", "created": "2018-03-13T13:56:02.000Z", "modified": "2018-03-13T13:56:02.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--baf077d1-6aca-4cbc-ba3f-33bda3b9411b", "target_ref": "x-misp-object--712481dd-995d-491f-b929-5e3322c631ec" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--da8a8cb6-5cce-4f12-999a-decbc7a60221", "created": "2018-03-13T13:56:02.000Z", "modified": "2018-03-13T13:56:02.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--13d8d248-26dd-4144-a295-f5359295233d", "target_ref": "x-misp-object--2a7d70a1-7b62-4ab4-8e52-eb2580366dfa" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--20d29a78-c0b7-4913-b104-62fa03151907", "created": "2018-03-13T13:56:02.000Z", "modified": "2018-03-13T13:56:02.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--be3b992c-a86f-4e3d-a44b-1e319fa67c66", "target_ref": "x-misp-object--34447c7d-838f-4cb6-b8d0-0a9f0a0af702" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b47a954d-2769-439b-b322-8422b6959fba", "created": "2018-03-13T13:56:02.000Z", "modified": "2018-03-13T13:56:02.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2bd8f5ed-adf0-45ff-ada9-9bed3a4060ae", "target_ref": "x-misp-object--ac8f6787-b5f5-4ee6-b1a0-0b303f34ab29" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e505219f-1409-411c-91b9-84c3eda1a965", "created": "2018-03-13T13:56:02.000Z", "modified": "2018-03-13T13:56:02.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c41a3658-a663-4d02-96a1-31891e0a2b70", "target_ref": "x-misp-object--0bdb8b75-3f37-4741-b0b9-5c45ed8f0468" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5c49b759-c0fd-4867-af0a-22e8b49434c7", "created": "2018-03-13T13:56:02.000Z", "modified": "2018-03-13T13:56:02.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d68f2720-4b5e-4632-a07c-161efaa36753", "target_ref": "x-misp-object--62a200f5-ada3-489e-8be4-0f841b49ccf1" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--49eb22ff-3515-43e7-894e-dbefca8cc87c", "created": "2018-03-13T13:56:03.000Z", "modified": "2018-03-13T13:56:03.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2d4e2c18-2028-4f1e-a670-a518a678dd03", "target_ref": "x-misp-object--9e3d433c-19c8-471a-a95e-f645423a88c3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--728e1822-7759-4d3d-97b7-1c25b4521298", "created": "2018-03-13T13:56:03.000Z", "modified": "2018-03-13T13:56:03.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1656bc8a-bb59-41ee-b95b-4d8c7709675b", "target_ref": "x-misp-object--93704ecb-f463-4722-92f8-61dea8ddeb24" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1d7f94c9-2a5b-49bd-8a09-b74bdd5a3b92", "created": "2018-03-13T13:56:03.000Z", "modified": "2018-03-13T13:56:03.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--cf0a1d5f-2e78-44fb-8ca1-850ba3b02c9b", "target_ref": "x-misp-object--ee2d4946-ea46-4614-929b-b892f9908209" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--75ae48fc-9c96-4187-aee9-cfa89d7aed85", "created": "2018-03-13T13:56:03.000Z", "modified": "2018-03-13T13:56:03.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ee5ee3f3-5de5-420c-a078-ecb7b097731d", "target_ref": "x-misp-object--db8dfdee-1040-4e3e-9c50-bafef41f9cd8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f4ad3b3b-9bfb-418a-aeb2-992b2e413687", "created": "2018-03-13T13:56:03.000Z", "modified": "2018-03-13T13:56:03.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0b5f6c32-9395-4cbd-a0bf-dd0d0530e2a8", "target_ref": "x-misp-object--33eda59f-9e49-43f3-958d-a55e2a6f1166" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a0117f7e-f538-4ddc-bedb-eb7a1fa1220a", "created": "2018-03-13T13:56:03.000Z", "modified": "2018-03-13T13:56:03.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c1fb6054-0e84-4bb2-a205-389fc558673a", "target_ref": "x-misp-object--40779d2d-1039-423f-a494-825d7952460d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f74eabc6-2d6f-4833-8b55-8c472c5cfae0", "created": "2018-03-13T13:56:03.000Z", "modified": "2018-03-13T13:56:03.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e77be68c-627e-49ae-97d4-e0905966779f", "target_ref": "x-misp-object--e15aae65-2ce2-4bf1-bf9b-bf0b5f6a4b42" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8bc4343f-b05d-4cda-a074-5fa3bcce4924", "created": "2018-03-13T13:56:03.000Z", "modified": "2018-03-13T13:56:03.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4d96769c-72ab-4627-b0d4-d0340cd5afb8", "target_ref": "x-misp-object--6a64e291-db27-4ab7-a4f1-d219c2d4a213" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--53fd8aef-7083-49d1-a1a9-f7e184ef41a9", "created": "2018-03-13T13:56:03.000Z", "modified": "2018-03-13T13:56:03.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--03ca8515-5a71-4777-af1a-d1ff1d6e5a8c", "target_ref": "x-misp-object--0adc6624-4217-4fff-8afc-70515da5eb04" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--19f41d5f-04b3-4ec0-9d72-57d9cdf56d3e", "created": "2018-03-13T13:56:04.000Z", "modified": "2018-03-13T13:56:04.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b842ab6c-0657-4c07-b5d6-7d84cddd0db5", "target_ref": "x-misp-object--41092416-53fd-4ebc-9dd7-c561b27c71d3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--11260109-8639-4cad-bb29-a5c964a6a276", "created": "2018-03-13T13:56:04.000Z", "modified": "2018-03-13T13:56:04.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--501eb9d3-d927-4981-9a70-029446f915cc", "target_ref": "x-misp-object--f7f485cf-39d2-496d-8559-26ac32cf9a49" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--84e4384f-ada9-4f95-88a4-e50fa1f41f66", "created": "2018-03-13T13:56:04.000Z", "modified": "2018-03-13T13:56:04.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--471a7dbf-92c0-465f-ba18-05dfb063b09e", "target_ref": "x-misp-object--df430360-e730-4f9f-bc3e-686429c7583a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--47376437-fa68-4b11-ae0b-740d2c9af2df", "created": "2018-03-13T13:56:04.000Z", "modified": "2018-03-13T13:56:04.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f01594da-861d-4f87-b396-47514fa8363b", "target_ref": "x-misp-object--0b79ea19-b0d7-40b9-8776-a2a016033403" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2518bcbb-21f5-4c4f-95e3-d44ddce7376e", "created": "2018-03-13T13:56:04.000Z", "modified": "2018-03-13T13:56:04.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--dfa0759a-c600-44e9-9876-9917c0a250b4", "target_ref": "x-misp-object--5839cd4b-1637-4bb9-bb4f-d47ebed941c9" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--28981d55-682e-42d5-b70f-f84d64f8d30f", "created": "2018-03-13T13:56:04.000Z", "modified": "2018-03-13T13:56:04.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6b548802-ebdb-43a5-9401-d2f8f3028d08", "target_ref": "x-misp-object--4d3b0767-ca9c-4a59-b2b6-6b5d45774032" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0ad94902-ec64-4b8b-8495-62604456f903", "created": "2018-03-13T13:56:04.000Z", "modified": "2018-03-13T13:56:04.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bb56a8a6-e4d3-42d0-833f-e4361b54331a", "target_ref": "x-misp-object--4d05714f-a5ef-4d4f-a006-8f30c4f980b6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8bc7c74e-e2a7-415a-ad53-de5fe93c24a8", "created": "2018-03-13T13:56:04.000Z", "modified": "2018-03-13T13:56:04.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1830e8c1-fd3c-4bf3-a1c8-62552d336b81", "target_ref": "x-misp-object--8dc0fa9d-8101-4cfa-a7ca-708ad1e8641b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b4bd2e30-66d8-4252-9a14-9ec626542a49", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0f99173c-5e8d-4184-9112-90283901d5a7", "target_ref": "x-misp-object--8f9ecfd9-d95a-4499-b479-443b63588110" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fcde48b3-9b16-4488-a261-bf046b9f8690", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--34be655c-ccbd-4123-b790-0e89cdaed85d", "target_ref": "x-misp-object--86b97a0a-ae05-4885-9931-5adfba823b6e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c4c9987c-91ae-4930-9d8e-8f80ce2566b9", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2f9ea31a-b956-4e72-9a09-e16343cfbff6", "target_ref": "x-misp-object--c298d324-80ca-47b6-839a-8194f675280e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f7abbad3-471a-4eb9-982a-56096e2aacd2", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4b8152a1-9434-45eb-b87c-1e63940242d9", "target_ref": "x-misp-object--3a193c9f-2212-4f1a-a4c5-4ad4c34c83c5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b4ae79db-22b5-4f49-91cf-14db2f0a9873", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8d352130-43c7-45ed-8071-f107683e85e2", "target_ref": "x-misp-object--826f69c0-6353-407b-959a-6db753aa04cc" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9d9752ac-827f-43cb-b890-1bdf319739c3", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--20c88590-7576-4c24-9aee-62d7609cbe8f", "target_ref": "x-misp-object--e3268eb8-ff83-4c94-a785-62496de9011d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--12a7d87c-58a4-4803-9448-5a76adaad1a1", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b138ff77-a9a1-4c08-bafe-29b0523b4ed8", "target_ref": "x-misp-object--633551b4-10c9-4b6f-9016-48b408fe38a4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3e237bbd-af5c-4bfd-acf2-7eb62b1f7cf1", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d66b5ccd-9abd-4f3c-9568-1d70c53d9bc7", "target_ref": "x-misp-object--e778b89e-a884-4832-abde-6ce011251693" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9f1c7ae0-e1fb-426c-8335-64ae738d55f8", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0892831f-a928-4d72-8fce-54a4e11fb7c2", "target_ref": "x-misp-object--c1f6c155-6147-4028-ba1b-a80b9dd7ba04" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a1f83cf1-8a9d-4f9a-9ef3-9516e0319bef", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--db1caacc-9b02-4c97-91a3-e53e3e1a06dc", "target_ref": "x-misp-object--43e01f3e-90be-425d-8ec7-de09b4b709be" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--76b5c9d2-0021-4e38-98cb-385042ef805a", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--67b2d93a-98eb-4c8a-9d16-4ad49b550d26", "target_ref": "x-misp-object--3df48692-1aae-44e5-ab1d-8e3f51964c1a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--51a86588-f1c2-406c-bbc9-b359b6be8670", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ae30abe7-aaf5-43b8-9a86-da761337167a", "target_ref": "x-misp-object--c8abd4d3-60c6-4618-844a-b449f10e295b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--938ccb0a-aee4-4d9d-91d4-49bf79d36b38", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--020da26b-fa49-4c8b-8c1f-1e9c9720417a", "target_ref": "x-misp-object--4b92ac74-45c4-4016-834b-d2bea2aa65e8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--45166eeb-f031-4dee-b2ba-8de170b6d1fe", "created": "2018-03-13T13:56:05.000Z", "modified": "2018-03-13T13:56:05.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bcfb9a53-5b69-4ac4-a2ef-18fef63ea165", "target_ref": "x-misp-object--e49d9375-8dd5-4055-89fd-07955351f316" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--da1d56af-1a8b-4673-91b1-c69c5d1035bf", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c008b064-faae-4e2d-b895-7a3386442500", "target_ref": "x-misp-object--6b181382-5e85-4d8d-8841-f7d56ba607a5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--bec8afb8-8f36-42b7-823f-c4925969f578", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a1d90f3c-1df4-47d6-a972-60df22e745d9", "target_ref": "x-misp-object--6477d441-4a92-4916-acd4-43b19d16a375" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f3de4a37-879d-494c-bc73-d18602c08b06", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--83c71c43-77bc-4dc1-9ac8-164993129370", "target_ref": "x-misp-object--1e276f55-5833-4810-8bfc-bbf15fb87297" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--347a22eb-fb58-4cd2-b8be-6f1d3579ff32", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d66b49cb-0f4e-4fcb-8233-a006348455ee", "target_ref": "x-misp-object--b7668932-8d26-4ac2-af13-2ed08885bcd6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--04cdf692-d2fc-42e0-a5ea-941dee105b5c", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e9d100a3-05ab-49d1-b1c9-0e8f2383befa", "target_ref": "x-misp-object--b35d1dc0-4300-4cc1-902a-5d9b046400df" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--938a7d2f-996e-4479-aa4e-35793a3bb18b", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--fe995598-bd9e-409f-8ea4-c08712c1b9de", "target_ref": "x-misp-object--10484feb-f108-437b-9229-acfc6b10217a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d754e6c4-d6bd-418f-b957-da3a75f7eb80", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ed1c5751-bee4-4a8c-97d2-a0073741bbe5", "target_ref": "x-misp-object--72f27ad6-4f8e-4276-b7fd-287b9d809f48" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--cb07dbf4-d451-471d-b597-a60beb3f8458", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--42a8a23c-9b54-4482-8a50-046820505d98", "target_ref": "x-misp-object--5fb36872-a865-41f8-bb2c-3aa9e2706869" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c201739c-89d0-44d0-8ff1-defc3886a164", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7ed9d6ef-d823-437d-8281-4c9949d2b6b0", "target_ref": "x-misp-object--7f6d2249-26cc-4a41-8db2-19b133559d95" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0d96c8fc-802c-4ff4-b7c1-a77d127a6830", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9495bd5e-39d9-40da-951a-008a0f307829", "target_ref": "x-misp-object--7a0ea506-37ef-4646-97d7-5574970b30b6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--afbf4356-496f-4802-a839-2acc6c11681e", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2f57ac50-c7c9-4a20-b794-a714dc18fd80", "target_ref": "x-misp-object--43401fe1-3ad8-4d5e-ae34-03c4e6b1187b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4d8c15ff-01a3-4ecc-8aa9-b8140b8a1b7f", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--174ec337-9a50-4f85-8127-3a95078ecd00", "target_ref": "x-misp-object--9e6aba26-4bc6-4749-9af1-5e33710786ba" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--23b28810-162e-42eb-a577-3254624b30a0", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d60d4a1a-e213-4e2a-a245-02347da28512", "target_ref": "x-misp-object--87acea24-f544-414b-9337-4aa282031caa" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4b3949a4-8bb6-4c98-accd-68e87cfa0aa6", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7f797fe4-795e-4152-94a5-ca85ad81e2e9", "target_ref": "x-misp-object--0df2e9df-4106-48f7-9f4f-6bf91b431e11" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4743cc7d-73ab-41d1-bf50-643d7f4479cd", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--46998b72-d9b5-4392-868d-0c843d34fc00", "target_ref": "x-misp-object--f98f0864-6f07-45b0-b0f4-0c88c07dffb0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--08703912-0743-4804-b82a-2a2ca59dc5d4", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--80685b00-a882-4132-9551-286ab3b430c2", "target_ref": "x-misp-object--bbdca7b6-37ed-4ae2-aace-f71b4c8ac0c0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d24ba6fd-1820-45f8-84c5-bb7170d15f90", "created": "2018-03-13T13:56:06.000Z", "modified": "2018-03-13T13:56:06.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2f15384f-e5ea-4e02-851b-9ecbf3508149", "target_ref": "x-misp-object--f1bdcb12-3b65-4f80-8ee4-063b9b5b66f7" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f12fd4ad-f347-43fc-80b3-16d0c6a2300d", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2b0031ea-445e-4619-98be-8c0059ec1b62", "target_ref": "x-misp-object--3bbcd9ed-3e47-470c-b431-e70443010365" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--678bc4c8-edb8-441c-9937-a1d67b11be95", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9a1ed464-4795-470b-820d-77ebba0fd9de", "target_ref": "x-misp-object--8e4dd566-7edf-49a9-8dc7-294cd59c3b80" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--67963398-dbb8-4004-b376-432fa5830320", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--436515ee-125b-445a-b9bd-0326cc980910", "target_ref": "x-misp-object--7b789516-52af-42e3-a4d8-402725bebbad" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0905c0b3-7c2a-45ff-955c-bba30cbc53a4", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c18d5005-8d30-4b08-8b79-5471964d2686", "target_ref": "x-misp-object--aad037d0-ccc1-42ad-9e22-b00255d02d6b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f3f0c8ba-30df-4dee-9fcd-f727d7b8cf01", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f21c8928-a0ce-47df-af6d-1dc4800e6684", "target_ref": "x-misp-object--092b2e56-e71f-407e-ae75-1048d5d294aa" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c5a4360e-d4b9-41e2-b47e-812da3d99807", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--26ed6d13-7ede-45a0-9d75-8484cbe26f82", "target_ref": "x-misp-object--3bc35d8c-6cd4-4946-bde4-deae4dae2192" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1797bf5c-7a48-47c1-bf4a-c697697a2aa6", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a378e561-df52-488b-8b61-9c31848fd405", "target_ref": "x-misp-object--5d9c9579-9bac-42fe-b4d7-d2c99c2e7f26" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d46c056c-56bf-4855-92a6-64f89c79d92f", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1fc063d9-da6f-49e5-9aec-04541560882f", "target_ref": "x-misp-object--c66e9d99-b3ee-4276-9bc4-e16197dc1343" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ee42dfe9-c4f2-46ce-9a18-448a299cb894", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a2d020e6-f709-4ed7-9c48-90d666c9f95b", "target_ref": "x-misp-object--164fe582-c64d-4e47-ae0d-a7dcd9ee6410" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e2c6d763-773e-4d67-aaa5-8cfc7003cc8b", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d012ed78-ce5b-4169-9631-e80bd8e8f78e", "target_ref": "x-misp-object--039c4cb6-78a0-4ee5-89c2-4e3fbb5d9db8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--bfd9b3c4-3d8a-475e-90bf-0d848053cfcf", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f0892f76-ec4f-4948-b54f-a7e56ee990ed", "target_ref": "x-misp-object--90685d7c-a0d2-4413-894e-7c1d95f10924" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--02e9ded5-869c-4635-b558-29801d94f4f3", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e55e7446-e0ac-4f7e-b4a7-7de1d3a96e50", "target_ref": "x-misp-object--9c601eec-34f8-4883-ad4c-991beb9c5313" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--153d9c4b-83a4-4c78-8c49-ef2e9432f95b", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f1bc257b-1f9f-4ffe-86be-35ffd892f3b0", "target_ref": "x-misp-object--c7bfc277-b689-4282-a52b-723f92964fb0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a07b3ca5-0382-4f64-aaf4-e80371b467a0", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b9b8ff6a-80a9-40a8-aa1e-000583538507", "target_ref": "x-misp-object--bc28e52a-d2b1-4db5-98b2-b78814197fd0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fc4ae9e4-887f-43f2-b17d-8137aaec965b", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5557a9c2-2926-4aa6-9091-3871ebd874d7", "target_ref": "x-misp-object--7888f078-6e6f-40d0-b426-fbf99c5e25ce" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3bae3ac9-17c5-4476-ada5-1a49b00a1a2f", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d9764fb8-d509-4b1a-9b6f-434bee32f6e3", "target_ref": "x-misp-object--99b98df2-668d-495e-b127-d171c1d9d3c8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--20a1b7e1-29bd-4d82-9ae4-1bceb66641bb", "created": "2018-03-13T13:56:07.000Z", "modified": "2018-03-13T13:56:07.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--64348811-02d2-43c3-a49e-65a3d4491dcb", "target_ref": "x-misp-object--521302dd-bf8c-4040-a8f9-026216bf0ada" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--74b44eea-b0e2-47ac-b5a5-71cd523996ff", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--56e47645-eac8-4997-a5cf-32192544f4ea", "target_ref": "x-misp-object--f6103ca7-a9aa-454d-be10-d6fbc27699f1" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a708b650-0bcf-4405-be59-89f49fc29ecf", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--31f4b6b6-e16e-41a5-9f5f-d451220d62f3", "target_ref": "x-misp-object--2ae0b87d-3b07-4a7d-a8f3-280f94879967" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4d3c8344-3b14-4e6b-9b48-b4d0e0a12b47", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--32d62c01-a77d-4a61-91e2-e479232e89fa", "target_ref": "x-misp-object--f4223054-bc53-4228-92bf-02380266e4d5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7b3be172-4da8-4ae6-9b5a-3b1cc90df8d4", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bbeb2a80-fffe-4959-a634-6d1b92c27966", "target_ref": "x-misp-object--68c69bf0-47b9-4ea2-8531-239821114309" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--89601073-696e-4555-b57f-7f3ebbef81c5", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--fe568963-2dc3-417b-99e1-5ad9a83f40db", "target_ref": "x-misp-object--df245559-1f77-4c8e-b92a-873b30f1c2d5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6edb979c-75d4-42d5-b20e-222ac381f73c", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--18dd827f-22e9-4c33-b517-6cbcddc95a21", "target_ref": "x-misp-object--e6a3fa3d-87e2-45e3-af5d-d6991ae8e074" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9b5f1c9c-55de-4a0b-a8a7-b9684c0cc3d6", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bd8efd15-6af3-43ba-84c8-eac4769883cf", "target_ref": "x-misp-object--618d429f-6a91-4bba-892a-c719cf60cea3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--37be9a58-d52c-4f77-855d-15ae1d1cef52", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--277f3ee6-3d34-4038-abcf-2499c69b02ce", "target_ref": "x-misp-object--f4efd30c-0621-4634-a2ec-478ab941efca" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--abd62766-5be6-45d2-a50c-d976642197a4", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9478791d-a2ed-4bbe-866c-f36e552defdd", "target_ref": "x-misp-object--837f0b81-3cbb-419b-82d8-2bb5de26578c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--cc3baf71-0289-4145-9b33-cc171533d64a", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--25ac76f6-4ab3-4d15-a4e4-4c5536e0520d", "target_ref": "x-misp-object--b8393ac2-5026-481f-82f1-db6fb4b48d28" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a4fd7649-1901-4ccd-8749-ffadd3c7366c", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1270a24c-137d-42b8-8bb2-f327d09c62d1", "target_ref": "x-misp-object--0bef6eee-e08f-4405-9ffa-7b98518e0fae" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a7ca3124-acd5-4461-bae3-125945764163", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--44a433bd-8cfe-4150-ac8d-16ca5a4982fd", "target_ref": "x-misp-object--5bfacbe9-088e-452b-864b-e4e0071f5dd3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5bfca9ec-00a3-4e8d-b54d-d60702bc8a1f", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b80818b7-46c2-41f2-8274-9bd66c2441b3", "target_ref": "x-misp-object--b55faed7-7aa6-460d-885e-2c47abff9462" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--610849b8-4a3b-40aa-b75b-b6e402ae79c8", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b1f1d953-5872-4004-bd05-9fa658e326fe", "target_ref": "x-misp-object--dd23efa6-454b-4338-82cd-ff495fb2b32c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8f2e7362-ebce-4702-8fff-d45a95271d73", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a20fd02a-a3bb-45a2-9cdd-537570f9d775", "target_ref": "x-misp-object--9dc0eda8-c956-43e1-8bc4-5c88a5da9d9e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f4595726-e0f6-4fb6-9749-b41d07c45162", "created": "2018-03-13T13:56:08.000Z", "modified": "2018-03-13T13:56:08.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2e2cb479-1811-4020-91b1-64206c1c3bf9", "target_ref": "x-misp-object--a681ce5c-c6b9-4dfa-86df-b14f736d5727" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--01cad9f8-fef3-435e-b0b7-9c667cad539c", "created": "2018-03-13T13:56:09.000Z", "modified": "2018-03-13T13:56:09.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ca040b60-0f2e-42d9-9503-73c4fe312591", "target_ref": "x-misp-object--4c3be041-e873-416f-a301-ac3f2e8ba8cd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--50600633-9b1e-4757-a398-3a7b9d385bbc", "created": "2018-03-13T13:56:09.000Z", "modified": "2018-03-13T13:56:09.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--41cff4ef-ba06-42ac-a0a6-01e30418969e", "target_ref": "x-misp-object--5f59b1cf-7051-497b-85ae-26bb254d7664" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9794e6a4-e825-4143-b82a-915fb841e86e", "created": "2018-03-13T13:56:09.000Z", "modified": "2018-03-13T13:56:09.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1f9b7984-58b4-4bdd-9b7e-c2782de29504", "target_ref": "x-misp-object--9c900612-9431-4577-8580-6099cfb0e4d4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--410f7ebf-5a29-4233-8b75-d5188117aad2", "created": "2018-03-13T13:56:09.000Z", "modified": "2018-03-13T13:56:09.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a731aeaa-5c51-454a-8690-3c7622717b8c", "target_ref": "x-misp-object--dbba2e99-1c39-493e-b7f1-5e50c4b677dd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--92297d6d-846d-4b13-b51d-3f6c92b9d90e", "created": "2018-03-13T13:56:09.000Z", "modified": "2018-03-13T13:56:09.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--17f52d1f-c8ce-45c8-996b-38d624db86c9", "target_ref": "x-misp-object--f48c3488-0954-4be2-972d-05c233558f73" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--067b8246-234a-48ac-a92f-caf6814e2207", "created": "2018-03-13T13:56:09.000Z", "modified": "2018-03-13T13:56:09.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ca0e53e1-d879-426b-9b6f-a60fc942957a", "target_ref": "x-misp-object--85d876f7-0257-4977-9817-d92fe656f507" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--107eb640-5e7e-4314-9cfc-4c149e163f83", "created": "2018-03-13T13:56:09.000Z", "modified": "2018-03-13T13:56:09.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c95b1e9d-e2de-413e-9ffb-4b87f049250b", "target_ref": "x-misp-object--83fe5578-3bef-44db-a66d-be68a3cbc329" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--31e73a19-7d07-45fd-a5a6-e83924560ab8", "created": "2018-03-13T13:56:09.000Z", "modified": "2018-03-13T13:56:09.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--06e88af6-9100-4e50-aed7-494831bf2a2a", "target_ref": "x-misp-object--e24a4551-324f-44dc-a13f-3fea25676610" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5e813edd-1517-4a82-ba2b-76ba053296f3", "created": "2018-03-13T13:56:10.000Z", "modified": "2018-03-13T13:56:10.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--59eda1ba-179f-4293-bd44-50871517d08a", "target_ref": "x-misp-object--d834c18d-a902-4c28-857c-4a0da7c92148" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8017a61b-0319-4cbe-b8db-f19c105f6cfd", "created": "2018-03-13T13:56:10.000Z", "modified": "2018-03-13T13:56:10.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a2c02004-e597-42d9-8a99-a8e678e68dfd", "target_ref": "x-misp-object--d575295b-27a7-4e8d-ae64-606955c6bcc7" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7b891db3-50af-4c26-be05-8a511e2cab27", "created": "2018-03-13T13:56:10.000Z", "modified": "2018-03-13T13:56:10.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--becac4fa-8cc6-4b3b-823f-cb2f413a18c8", "target_ref": "x-misp-object--34023aca-655f-4916-b588-65ed3f78c8cc" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8953ea5c-afec-45cc-95d0-4433c9218df3", "created": "2018-03-13T13:56:10.000Z", "modified": "2018-03-13T13:56:10.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--df145429-2ca1-436f-b388-10fa744f43db", "target_ref": "x-misp-object--6c998244-f800-48ff-98d8-3f232c8f21c8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--07723344-a1bd-48f4-aae4-b5a56ec884f7", "created": "2018-03-13T13:56:10.000Z", "modified": "2018-03-13T13:56:10.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--78f1fadb-c0cb-4ea2-8aec-0c43d2f960e0", "target_ref": "x-misp-object--a0a0caae-59b2-41c5-b073-243c37515fba" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b8ba0151-1c69-46e8-b97a-6b13871a753c", "created": "2018-03-13T13:56:10.000Z", "modified": "2018-03-13T13:56:10.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b1adda64-9a8b-4634-8e63-327e75d42eb8", "target_ref": "x-misp-object--f7b56700-8e0d-4fb3-9a59-08cef7c60a30" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6324e7c0-4012-4969-ac38-5d5b1d5e44b8", "created": "2018-03-13T13:56:10.000Z", "modified": "2018-03-13T13:56:10.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ee11a006-60cb-4c20-b2db-27b8408162d1", "target_ref": "x-misp-object--61bc1c8c-cd0e-4f35-87ef-c686650b7622" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e40186e0-338c-4f0e-91c5-95c7460f98da", "created": "2018-03-13T13:56:10.000Z", "modified": "2018-03-13T13:56:10.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--44b91ea0-d5c5-45b2-b85a-cf3d37d53086", "target_ref": "x-misp-object--483cd876-ce01-40a6-a4d2-0f11987cd0da" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ff718d27-1c67-4b2e-813d-8ed0d082682b", "created": "2018-03-13T13:56:10.000Z", "modified": "2018-03-13T13:56:10.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6b50419e-57d0-43b7-bc75-8c92995bea47", "target_ref": "x-misp-object--8a1d430b-966e-4e9e-86f5-fcf619c3dc87" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e8d4c842-2784-4e6d-82e8-9f274b39abd3", "created": "2018-03-13T13:56:10.000Z", "modified": "2018-03-13T13:56:10.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--78c3f029-acfc-4d24-94f2-18058e811bd6", "target_ref": "x-misp-object--73af1f83-a272-4099-b219-b05e77c7d7e1" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2a4b5d78-a394-451d-8983-8962fb525027", "created": "2018-03-13T13:56:11.000Z", "modified": "2018-03-13T13:56:11.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e2f6f53c-1b21-4f9b-ba9c-da35fc181c97", "target_ref": "x-misp-object--e19b532c-dd5a-4278-ae1c-372d66b8b146" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ab3b66b3-6899-4b09-8026-f3cbd10a7bc6", "created": "2018-03-13T13:56:11.000Z", "modified": "2018-03-13T13:56:11.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7737ccff-f82f-494b-90cc-1b22e2c2b6b5", "target_ref": "x-misp-object--0d6879bc-8075-4bf5-9a98-f06c6991f1ac" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--06cd5dec-04e9-46cd-9029-0ff99d9760d1", "created": "2018-03-13T13:56:11.000Z", "modified": "2018-03-13T13:56:11.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--08609b6c-4c68-4ab4-8a22-8ce67ae5dd55", "target_ref": "x-misp-object--1f4d6780-90cb-4281-95a5-6524ce6145d8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--35119b74-6606-485a-bc4b-ec5f34ca7163", "created": "2018-03-13T13:56:11.000Z", "modified": "2018-03-13T13:56:11.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2b485a76-ed4a-4832-8601-93576827def2", "target_ref": "x-misp-object--bfe8c8f1-123f-4fbe-9a57-ca43bda77bbb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0708b854-918e-4260-8601-3ad2f80b0afa", "created": "2018-03-13T13:56:11.000Z", "modified": "2018-03-13T13:56:11.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ccb0100a-cc61-45c9-a42e-946b0b9a2bbe", "target_ref": "x-misp-object--3d1d4143-fd00-4946-b5c3-227bf730b271" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--851a1899-dc98-41f9-a44a-90ba053818d7", "created": "2018-03-13T13:56:11.000Z", "modified": "2018-03-13T13:56:11.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d28c925e-1dc6-4915-8cc1-31b30c1d3d77", "target_ref": "x-misp-object--7295e73f-9200-4da9-9cee-1235ab0ef8c0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--15a0de8b-d8aa-422b-9501-f83b6e86cf70", "created": "2018-03-13T13:56:11.000Z", "modified": "2018-03-13T13:56:11.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--031272c7-aeea-4886-bc0e-c82c2399ced1", "target_ref": "x-misp-object--6279338c-1317-49e5-9fa3-61d39d1fd85e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f51d9904-4ea0-45fd-ab63-bcbc3ada2cdc", "created": "2018-03-13T13:56:11.000Z", "modified": "2018-03-13T13:56:11.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--dd1b94ca-12df-4746-81b9-0f2762545592", "target_ref": "x-misp-object--345cb4a5-817c-402e-8306-11ac04b71d83" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e25f55c5-b0fa-4bdc-92e6-ec6946298f6d", "created": "2018-03-13T13:56:11.000Z", "modified": "2018-03-13T13:56:11.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2ac12e74-5306-4785-82c0-7ba96983994a", "target_ref": "x-misp-object--b55def3e-7c02-45e4-8e38-55ae68cfc362" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0cfa8014-95b6-449a-82cc-a1a1c7f64dfc", "created": "2018-03-13T13:56:11.000Z", "modified": "2018-03-13T13:56:11.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b5b1d0ad-ca31-4465-b922-bc5cdda1fe8e", "target_ref": "x-misp-object--bcd5c109-6f56-4f18-b58c-0866365f87b1" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--db663ea2-ba17-407e-a847-a6ddb046b03c", "created": "2018-03-13T13:56:12.000Z", "modified": "2018-03-13T13:56:12.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3f19950c-9a19-4b31-8f00-1af92d3a1bc0", "target_ref": "x-misp-object--1d20673f-8d52-47c7-9740-2ba5d4dfcb48" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2682897c-6d78-4e64-9ba2-76e179e74251", "created": "2018-03-13T13:56:12.000Z", "modified": "2018-03-13T13:56:12.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4998219b-3f2a-4415-9120-aec6680e1e44", "target_ref": "x-misp-object--80e03ba7-89f4-44f2-a0e4-6392a20743b2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8bec4ab0-f15b-47e4-a2c6-0b9dea21129c", "created": "2018-03-13T13:56:12.000Z", "modified": "2018-03-13T13:56:12.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bfdac829-84e7-422b-98b4-6c2668aa0587", "target_ref": "x-misp-object--af568763-fed7-4558-9441-26b2cc6362b9" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--aeb24442-0f83-4129-b725-28790cd48407", "created": "2018-03-13T13:56:12.000Z", "modified": "2018-03-13T13:56:12.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--86bad043-2708-431a-ba23-f83d6450e4ab", "target_ref": "x-misp-object--35347bf8-788b-482c-b431-3b6258b1e9b8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--89227cfd-9d8e-4bd2-aa51-0ff6555983cc", "created": "2018-03-13T13:56:12.000Z", "modified": "2018-03-13T13:56:12.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8e08f62d-c431-4475-a0da-023c8f670606", "target_ref": "x-misp-object--a3062c18-d293-46c0-9175-e3c86691eea4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--492931bb-d22c-4abb-ad3c-0b9e1e0d54c0", "created": "2018-03-13T13:56:12.000Z", "modified": "2018-03-13T13:56:12.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--cb23222d-61f4-420f-97e5-208d0df4d905", "target_ref": "x-misp-object--b3c43305-f706-4271-a3cc-9dd6a47f013e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3ef4d56c-d989-4b5c-8c13-0b66936ba3ed", "created": "2018-03-13T13:56:12.000Z", "modified": "2018-03-13T13:56:12.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--be84377d-270c-48ad-bd4e-797b86509254", "target_ref": "x-misp-object--54a18057-87d9-4091-a8f5-e919a6af8f8e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ad33c0ad-882d-4570-8342-f477c85daaa5", "created": "2018-03-13T13:56:13.000Z", "modified": "2018-03-13T13:56:13.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b97217c8-a47e-418f-9dd7-089aaa3ad22c", "target_ref": "x-misp-object--738e4e9c-f2c7-4297-90b3-6f559923bbf3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0ea3b61f-a29e-4a4a-ae9d-6f3f0319c52a", "created": "2018-03-13T13:56:13.000Z", "modified": "2018-03-13T13:56:13.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e06f91b8-355e-4ea7-9de1-3aa5a3b948bc", "target_ref": "x-misp-object--9f13752e-3013-45e2-90ec-6b5a99066505" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--41bc8e82-2ebf-4cde-8832-dbd2a479609d", "created": "2018-03-13T13:56:13.000Z", "modified": "2018-03-13T13:56:13.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d294a9bb-d773-4cf2-8e2a-3fd99391206f", "target_ref": "x-misp-object--f61c6948-4f4b-4145-af51-b50999bace44" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4fecb7ae-9f2a-4015-a444-1f84866c59b7", "created": "2018-03-13T13:56:13.000Z", "modified": "2018-03-13T13:56:13.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--82299055-ed80-4537-80f5-9436f519f766", "target_ref": "x-misp-object--2d2f3ea6-6d2a-46eb-8fa7-fe52ec43d7be" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--dcf4e965-91ca-4f22-9e00-55b3a1aa7395", "created": "2018-03-13T13:56:14.000Z", "modified": "2018-03-13T13:56:14.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d6278a28-8753-4bd3-b5dd-b615a535c947", "target_ref": "x-misp-object--e8b635f4-5d5b-4caf-9d35-c214b6dab867" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2f010468-46c1-4ab7-ae5b-5e5feaca0b64", "created": "2018-03-13T13:56:14.000Z", "modified": "2018-03-13T13:56:14.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--cb61ffc7-25b6-4635-af6f-bed3089af7e9", "target_ref": "x-misp-object--804d7a0d-4a71-44fc-a954-6dc9def20bbf" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0e184e58-6673-40cb-95bd-be24511e6e29", "created": "2018-03-13T13:56:14.000Z", "modified": "2018-03-13T13:56:14.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--cccbb05d-835e-45c2-8022-a743d3ad5851", "target_ref": "x-misp-object--8d5816f1-dcb6-4f83-8356-64b3ec5b3ba2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--570470a7-2850-4399-bce8-8172206ceeea", "created": "2018-03-13T13:56:14.000Z", "modified": "2018-03-13T13:56:14.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d7d6852a-a95e-4d3a-84cb-06b3701e6a6a", "target_ref": "x-misp-object--c3a835d0-178c-475e-8d29-863ad198edde" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5a5092fd-e9b9-4c4d-92f5-7e510f3fc8df", "created": "2018-03-13T13:56:14.000Z", "modified": "2018-03-13T13:56:14.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--82a15bb8-9f6d-407e-b744-bb8b9fee2159", "target_ref": "x-misp-object--f2656df0-ab61-4366-972e-eb7ccf26e9f3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2eb60249-7714-4803-8b79-37520f20f850", "created": "2018-03-13T13:56:14.000Z", "modified": "2018-03-13T13:56:14.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--69820f4d-ae64-4f60-b206-e7f473a8bb57", "target_ref": "x-misp-object--1712c055-825b-4483-a0d3-dfaa467814df" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e39620dc-7a4f-4162-a934-2b0f4a48ce83", "created": "2018-03-13T13:56:14.000Z", "modified": "2018-03-13T13:56:14.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1244ab55-e050-4f27-8815-9829d0d09a58", "target_ref": "x-misp-object--51b0df0d-f04c-4a11-8e09-bb63da256b07" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--45ccd6a1-010b-4441-ae63-7102fa821a93", "created": "2018-03-13T13:56:14.000Z", "modified": "2018-03-13T13:56:14.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3308282a-8f19-47ed-81c4-f5f8cd8d007a", "target_ref": "x-misp-object--cf6405fd-7401-4d60-a130-a6224cc18428" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e5351ed5-e784-471c-b5de-0cba45e16022", "created": "2018-03-13T13:56:14.000Z", "modified": "2018-03-13T13:56:14.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b7aed3f9-8bbc-49b9-96ef-1185d97372fd", "target_ref": "x-misp-object--3e466307-8e1a-4b17-b923-67ccffe9fb67" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2063e4b7-b689-4d6d-ad08-eb688d980abf", "created": "2018-03-13T13:56:14.000Z", "modified": "2018-03-13T13:56:14.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--21b42c11-3463-4f2e-9cf5-dc2f947712eb", "target_ref": "x-misp-object--5f436b33-8051-4e11-85ac-d19712b3b5f0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c9eae250-1e4e-43e5-a1fb-ff4098d20847", "created": "2018-03-13T13:56:15.000Z", "modified": "2018-03-13T13:56:15.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--83a08501-1293-44f5-972c-a638468112d9", "target_ref": "x-misp-object--4578fb47-f580-41dd-a90f-baa104b9d39b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--08c962d3-ff97-4a0a-9d84-af9a20d7fb07", "created": "2018-03-13T13:56:15.000Z", "modified": "2018-03-13T13:56:15.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--dfdd74ed-2446-41e7-bf1d-e876e277a29d", "target_ref": "x-misp-object--57ebad98-e219-4c11-8ba9-e89e7c956763" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--516b2301-c9d5-4a14-a512-ba3273118fe5", "created": "2018-03-13T13:56:15.000Z", "modified": "2018-03-13T13:56:15.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9bc65993-ca59-4309-83d8-0444b2fb8c06", "target_ref": "x-misp-object--af6df848-4958-4d51-b02b-f26f53e48132" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a605bdc3-dfc1-4831-b7f9-a342e57c267c", "created": "2018-03-13T13:56:15.000Z", "modified": "2018-03-13T13:56:15.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--978c6c81-588f-493c-b3db-a6d8a2a47990", "target_ref": "x-misp-object--aea5d4a9-d27a-4a59-b732-317d060c8df3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--34d7b98e-9d13-46a5-af1b-34b241028a4e", "created": "2018-03-13T13:56:15.000Z", "modified": "2018-03-13T13:56:15.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b4ac89c0-7022-47ba-b5b6-b7d6f505aebd", "target_ref": "x-misp-object--cea5961c-f56f-47ed-805c-8ead55535284" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a48fe0a1-bdaa-4ee9-8669-5ac1adbf0012", "created": "2018-03-13T13:56:15.000Z", "modified": "2018-03-13T13:56:15.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5c173e41-3f6a-45b7-8dc3-9fd00209ec77", "target_ref": "x-misp-object--e8449b46-a354-467e-9e49-68031b6e1752" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b6eca7cc-b404-4c0b-a2a2-f3fa4c422efe", "created": "2018-03-13T13:56:15.000Z", "modified": "2018-03-13T13:56:15.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--620fa80a-ff56-4958-893f-c9178f12924a", "target_ref": "x-misp-object--f6d1820f-b409-4ae6-8576-398772a06e02" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--692469f9-16ca-4e17-9d42-98644085951a", "created": "2018-03-13T13:56:15.000Z", "modified": "2018-03-13T13:56:15.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2b5a4323-cc12-4e0f-b80f-932c607e3061", "target_ref": "x-misp-object--914a9489-58b9-4d1c-9bfd-c89783e85427" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b190bfda-7d01-41f3-b0a8-2d97df9c5b69", "created": "2018-03-13T13:56:15.000Z", "modified": "2018-03-13T13:56:15.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5fa6a990-0c0c-45a2-b44f-8f6b2fb92d30", "target_ref": "x-misp-object--29ed7fda-0038-4836-890f-220300a61011" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6d351f65-99aa-4abc-88f2-e156a2655008", "created": "2018-03-13T13:56:16.000Z", "modified": "2018-03-13T13:56:16.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b8edda24-98d3-4d12-b8f1-0b075e5127e1", "target_ref": "x-misp-object--f17b3e60-ddc8-4acf-9c1a-23484fb6bdb4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--353848a9-094b-43df-9a42-9e50840a92cb", "created": "2018-03-13T13:56:16.000Z", "modified": "2018-03-13T13:56:16.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--856f07d3-d2ca-4f97-bcc9-9c42047e154b", "target_ref": "x-misp-object--e81ed941-5baf-4a9f-9478-1a82e2806177" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--77b07828-6526-4a36-8acb-1a3d1ebf03f1", "created": "2018-03-13T13:56:16.000Z", "modified": "2018-03-13T13:56:16.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--67d15086-8265-4536-835f-eacf118dbdcf", "target_ref": "x-misp-object--4934a6eb-4335-4e88-ac95-11ec7ce3d651" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4e39dbce-2b39-4afd-b3a4-95e5c1a9947d", "created": "2018-03-13T13:56:16.000Z", "modified": "2018-03-13T13:56:16.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--914b8dcb-39b8-41e6-9314-701cb1685d55", "target_ref": "x-misp-object--c3b196f2-3089-4461-9f1e-e2ded8cc54fb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fc763b86-cd77-4dcd-86ff-1fe29776b1e8", "created": "2018-03-13T13:56:16.000Z", "modified": "2018-03-13T13:56:16.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d2a0d57f-8bd4-4f7a-bd2f-558d1ccc9e42", "target_ref": "x-misp-object--994a0748-7980-4a57-a95b-2ea57fd7169c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a448a60b-e8d2-4c1a-85cb-6b400c3dc7c4", "created": "2018-03-13T13:56:16.000Z", "modified": "2018-03-13T13:56:16.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--08a40cfc-aaa0-4762-9aec-343975e97a59", "target_ref": "x-misp-object--7c08f3f9-329e-409a-b4e2-ee8071725fdd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3bbb9eba-654c-4e95-925f-ed709fea33f4", "created": "2018-03-13T13:56:16.000Z", "modified": "2018-03-13T13:56:16.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d9defefd-c657-4cd9-b750-a295b80285fa", "target_ref": "x-misp-object--70c8bcb8-ca3d-4852-b4aa-8638899816c6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--dab7e1c5-b462-42fe-a1f5-90d9e45557c3", "created": "2018-03-13T13:56:16.000Z", "modified": "2018-03-13T13:56:16.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c227e4dc-e420-45cb-9f53-1126208d93ed", "target_ref": "x-misp-object--cbca6d38-3a3d-4c08-bec0-22e39f71f2eb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--899c4dfb-2bf0-41fd-a5a6-d691024038f9", "created": "2018-03-13T13:56:16.000Z", "modified": "2018-03-13T13:56:16.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ddc8833c-f045-429a-9866-12bc325e4a8d", "target_ref": "x-misp-object--8f991164-986e-4588-84a1-017fc4940631" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f78708bf-5ed5-4a9e-ba4f-1e92568d3308", "created": "2018-03-13T13:56:16.000Z", "modified": "2018-03-13T13:56:16.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--413a18c9-945a-4bd1-b541-691bc530c2fa", "target_ref": "x-misp-object--7e632066-66c8-4b57-844b-3e57c53c0644" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--dd72febc-c247-4339-8f67-2ad2350fedfb", "created": "2018-03-13T13:56:17.000Z", "modified": "2018-03-13T13:56:17.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5cf33f8d-dd97-4611-8b61-97b2763a0bd8", "target_ref": "x-misp-object--b267d777-f810-4701-b57b-47643fe6e370" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e087868e-fdca-4b4c-acc6-da1a2abc79ce", "created": "2018-03-13T13:56:17.000Z", "modified": "2018-03-13T13:56:17.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8a341ca2-f68a-45ed-9c09-cacdac4e43ba", "target_ref": "x-misp-object--949361d6-c71c-4ab9-b3b2-5fdef6a8549a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1513b1c3-a060-4f8d-8ea6-28c4bd549afb", "created": "2018-03-13T13:56:17.000Z", "modified": "2018-03-13T13:56:17.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--05e14172-6a5f-4438-9cf9-18601485fee8", "target_ref": "x-misp-object--718abdcd-3f1f-4652-9751-33a11b262a4b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--92e1ed4e-5da9-49e7-974a-34bd586f328c", "created": "2018-03-13T13:56:17.000Z", "modified": "2018-03-13T13:56:17.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ac9429a8-1a38-443b-ac79-947e77c20362", "target_ref": "x-misp-object--64350fec-6cfd-440f-82ca-f42b591d4a6e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--63aac522-c452-49b9-b4ae-eccf4c86aea2", "created": "2018-03-13T13:56:17.000Z", "modified": "2018-03-13T13:56:17.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--22d8e158-223c-4edb-b351-461809ff16af", "target_ref": "x-misp-object--d8c73c7c-20f0-4816-8447-5bfa171455f8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f107b73d-2fbb-4c8f-a2b2-e45cfc6a5929", "created": "2018-03-13T13:56:17.000Z", "modified": "2018-03-13T13:56:17.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bc5863ac-57aa-4555-91f3-f8cddfd3a380", "target_ref": "x-misp-object--fd565702-5854-489b-9168-aa56033b44b8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--94b76f64-2267-426f-aadb-5471595dee2c", "created": "2018-03-13T13:56:17.000Z", "modified": "2018-03-13T13:56:17.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--37650bda-445d-45fc-89bf-25645506db23", "target_ref": "x-misp-object--adf2edf5-1bf0-43ce-bb48-03b0d632410f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c291d0b4-d507-40e2-86f2-80d508dd0787", "created": "2018-03-13T13:56:17.000Z", "modified": "2018-03-13T13:56:17.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--12a9552f-dcfa-4b1b-b9a0-8577c5f592d5", "target_ref": "x-misp-object--996697de-50d0-4c27-ae0b-f7cf1d789da0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d10e0ecc-3f0c-421c-acc4-5fdd4620baaa", "created": "2018-03-13T13:56:17.000Z", "modified": "2018-03-13T13:56:17.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--dc1da79a-987b-4226-998b-f6befaa03fb8", "target_ref": "x-misp-object--1456abf1-55d0-43f6-9a4f-e91acc35882e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4b09bd28-1c89-4fc7-ac5c-d81824cc4d54", "created": "2018-03-13T13:56:17.000Z", "modified": "2018-03-13T13:56:17.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4775ae1d-ebf4-42ae-88cb-2d9e7b7e3485", "target_ref": "x-misp-object--81d57356-7bd7-44dd-99fe-a227e1ac00ab" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--46071724-ee2e-4337-b79a-c1ac3f2fbd15", "created": "2018-03-13T13:56:18.000Z", "modified": "2018-03-13T13:56:18.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8d8f022d-7e99-4d4b-9999-3c7bb3331ded", "target_ref": "x-misp-object--720e4a35-25aa-4682-91b8-74d26d2c83ae" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--34bc434e-ec07-40bc-9f72-b3bd13de12ff", "created": "2018-03-13T13:56:18.000Z", "modified": "2018-03-13T13:56:18.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c0993f0e-c4c9-4607-8438-5f67688c20d6", "target_ref": "x-misp-object--3ce18542-570a-4988-b75b-702cfa1a3c1a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--521a032b-649c-41e9-a848-8393722a55a2", "created": "2018-03-13T13:56:18.000Z", "modified": "2018-03-13T13:56:18.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--97971b0a-3559-409a-94ce-36fb05fbf4e6", "target_ref": "x-misp-object--1627866d-dabf-4069-bbe2-355f3f0a9647" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--39bd1cb4-cdfc-4ffa-82d0-920bc03a8737", "created": "2018-03-13T13:56:18.000Z", "modified": "2018-03-13T13:56:18.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0fa0b818-b2b2-482a-8567-cc8996d54f49", "target_ref": "x-misp-object--816947c3-4298-4ae3-bb19-8e2b8986ad81" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e36c745b-e7b7-4763-b5fa-b3248504ee8c", "created": "2018-03-13T13:56:18.000Z", "modified": "2018-03-13T13:56:18.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--66f170fb-5db2-4ede-ad9b-121ba032c974", "target_ref": "x-misp-object--6af3ebc6-434f-441d-ae40-b876937c8612" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5beccbe0-387a-4f02-a0f6-49c5ebd77392", "created": "2018-03-13T13:56:18.000Z", "modified": "2018-03-13T13:56:18.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--21046835-1b5f-454d-8fa7-a0d11e43314a", "target_ref": "x-misp-object--5ffcf6a5-9852-4f0e-a619-c557f9bafee2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1658cde6-2dba-42b8-a1b7-ea369706722b", "created": "2018-03-13T13:56:18.000Z", "modified": "2018-03-13T13:56:18.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bc18d46f-3297-462b-bcd7-6db52efaf56b", "target_ref": "x-misp-object--fe44dcc1-5471-4572-aebc-7fc43c58831b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a270bc02-b95e-432a-b6c7-de9b90b78b59", "created": "2018-03-13T13:56:18.000Z", "modified": "2018-03-13T13:56:18.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9bff3672-c80a-4c16-b2cf-35a63fe86433", "target_ref": "x-misp-object--8670cf25-98a7-42aa-9cc2-e2e9d90a037a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6b96bf80-66a7-449e-93a1-6f8c6978824c", "created": "2018-03-13T13:56:18.000Z", "modified": "2018-03-13T13:56:18.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4225cb42-201f-47ed-ad03-c0f4543cb253", "target_ref": "x-misp-object--26451a75-cc08-4fbc-87da-436e2cde572f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--accf4a39-78c0-4c24-9389-818c0957acd9", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e43eb2dd-268c-4940-a19c-8c059cee8e40", "target_ref": "x-misp-object--c336794f-46a9-4009-b240-e5cad850bb96" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3f12d5a2-22f9-4f95-ac2d-021fb187ad23", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--da460413-76f6-41a0-a2b8-1542e365d0fb", "target_ref": "x-misp-object--0677e0d0-8a8b-4754-bb9e-68525e65a9d5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--32e0c8df-a54d-48bb-84ad-d2f761ff0bbe", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0b4ad0cd-6a11-4eb2-a62e-85f88be78b2a", "target_ref": "x-misp-object--49f5f1f3-16d8-4061-b055-0b6335db369b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--69fcaf09-58cb-4d53-9471-0cd8948183bb", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--40314b91-c2b2-4eee-9c6b-2fe46238896e", "target_ref": "x-misp-object--6e14b2cc-41af-4ef4-8810-6dcf339bcfcf" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--23344d64-32c0-41fd-93e0-13a405c9ef5e", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8823252f-4421-4a25-b020-6c4d71b72f3c", "target_ref": "x-misp-object--70eb97ff-b5cf-4a33-9c55-b66c838dc136" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0f37cbe5-d732-4d19-90b9-69b8345f499d", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4c585e51-1879-481c-a50b-8ecef2fbfee3", "target_ref": "x-misp-object--13068af6-8ddc-4e99-a409-deda2159b103" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a667a585-d930-44bb-ade1-5cf59f0e1abe", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--37a19c4b-d0e7-42c7-9611-445522921890", "target_ref": "x-misp-object--edcfd0af-4e00-4bf3-bfb2-f5e14e215c96" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--121ec735-3253-4df6-af5c-7f17df8d8974", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1145dde9-b4a2-472a-9d5c-b9b6d48ed3a1", "target_ref": "x-misp-object--06473880-41e8-46f2-b9c2-4cee0e116855" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--53a1a3d5-6208-4e56-bf34-0d70dbc00620", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b3edef8c-598d-40e5-bb2d-18647024b51b", "target_ref": "x-misp-object--fbbb0d5e-64de-4be0-90d7-a093afb63f88" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--96d6a574-e814-4515-963b-2a9837df26b6", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9acd5c23-ef98-40a7-bfc9-caf28c3f23eb", "target_ref": "x-misp-object--aed42feb-e540-4b67-961c-f67718df57a6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--dcf6bb14-9af5-469e-b042-db905398271d", "created": "2018-03-13T13:56:19.000Z", "modified": "2018-03-13T13:56:19.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ab226ccc-8a64-436f-ad9a-9be4b5777b0f", "target_ref": "x-misp-object--44bf11f9-5d56-4ca4-882b-6702bcf34a30" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fee2d4e0-1abf-4c84-89ec-aa9ef8b56fba", "created": "2018-03-13T13:56:20.000Z", "modified": "2018-03-13T13:56:20.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--927f792b-19a9-4c29-82a9-b32675909be3", "target_ref": "x-misp-object--0d77908a-f0f7-4781-97d2-246bdbee37ec" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2a27da74-9275-408f-b3cd-0ddd1e9bb017", "created": "2018-03-13T13:56:20.000Z", "modified": "2018-03-13T13:56:20.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7a0a06e2-e651-4fd1-a48b-4b88352b1c4f", "target_ref": "x-misp-object--1ecae68a-3fa0-46b5-9a9c-4ef390e211bd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2f03820d-dd57-44b6-a18c-f222d28c2a45", "created": "2018-03-13T13:56:20.000Z", "modified": "2018-03-13T13:56:20.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1c2f9b9e-1a6f-42bd-93ea-8b0df438103a", "target_ref": "x-misp-object--ffb0fd88-2cc2-46da-869b-788448ed5ca4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b790e04c-b109-4f44-8516-c613b71563e6", "created": "2018-03-13T13:56:20.000Z", "modified": "2018-03-13T13:56:20.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--80c4fd2c-a08f-4ba7-bc29-6e29ea981bd0", "target_ref": "x-misp-object--42229f3c-506e-45d1-88d3-4e2c9f27ccad" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b333d9db-0cdf-4316-9e74-999fb96460bc", "created": "2018-03-13T13:56:20.000Z", "modified": "2018-03-13T13:56:20.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8d8aeabc-15b4-40f9-9bc1-7b07df4455b7", "target_ref": "x-misp-object--c7f784cb-512a-4528-b270-ea27855f4166" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6c83d946-f828-4efa-8f40-8d2fc11cda18", "created": "2018-03-13T13:56:20.000Z", "modified": "2018-03-13T13:56:20.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--509e750c-3a95-40fa-ad9b-76f22cdc492b", "target_ref": "x-misp-object--030a8ee8-106b-4afd-9a08-f135111ee17f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8fe91604-18f9-4a7b-a0c6-af556583958d", "created": "2018-03-13T13:56:20.000Z", "modified": "2018-03-13T13:56:20.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8aea02c3-b7ab-4049-a7d0-574248ffc5ce", "target_ref": "x-misp-object--9fe05add-499d-4dd5-a632-7f6283f12006" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--58170757-1954-4264-b27a-18de3b5e927c", "created": "2018-03-13T13:56:20.000Z", "modified": "2018-03-13T13:56:20.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9f4251f1-9409-47b5-a6ab-bb1b0eb81236", "target_ref": "x-misp-object--a6c66b4a-943b-4095-89fe-af13049c2857" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--030e7600-989c-47db-a01d-ae16e9af27ec", "created": "2018-03-13T13:56:20.000Z", "modified": "2018-03-13T13:56:20.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--627d360a-1b2e-450b-8fba-76deceb75528", "target_ref": "x-misp-object--04de7a55-7030-479a-9a54-1b3b5857a7cf" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--cf6fdfb8-a67b-4f0d-924c-8a2172f7774b", "created": "2018-03-13T13:56:20.000Z", "modified": "2018-03-13T13:56:20.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d34ba1e1-ea64-48da-8df2-4ac0c83d2174", "target_ref": "x-misp-object--64bec757-4f02-4661-be85-d133f1f916f4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5a663805-4c8c-4683-b441-7e8024bbbe70", "created": "2018-03-13T13:56:21.000Z", "modified": "2018-03-13T13:56:21.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--95d5d4b0-6b7d-4606-aad5-deffead81484", "target_ref": "x-misp-object--8c3771ce-366b-4cfb-be18-490fef4a77e3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--681fdbba-2f73-4528-99bf-605dd64c0996", "created": "2018-03-13T13:56:21.000Z", "modified": "2018-03-13T13:56:21.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7e2b3829-7e79-4457-8c46-52cc0a4c135b", "target_ref": "x-misp-object--7cfdff1a-969b-4132-81e2-91db2d53b935" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--34f58ad0-4bf1-47e6-85e5-4e454d98a9c4", "created": "2018-03-13T13:56:21.000Z", "modified": "2018-03-13T13:56:21.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6b7e96a4-c224-4cd4-9463-0a4abfe1310c", "target_ref": "x-misp-object--6d78971f-8ac5-459a-8e28-61152f4387f6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--431283fc-06d3-43ab-baef-d9ced813f911", "created": "2018-03-13T13:56:21.000Z", "modified": "2018-03-13T13:56:21.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6d443c89-c0fb-498b-b29c-f70a8e9b7441", "target_ref": "x-misp-object--f7e1ca9a-c724-4270-b711-d7311d1bf670" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d1756b83-14b8-419d-a855-8ff99ae1e8fc", "created": "2018-03-13T13:56:21.000Z", "modified": "2018-03-13T13:56:21.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8bed1326-1a1d-4928-8b15-a0b7ca1ee902", "target_ref": "x-misp-object--49292793-cd90-46f5-826e-83edb402829d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d7d943e5-6633-4a32-873b-63d9218de9f0", "created": "2018-03-13T13:56:21.000Z", "modified": "2018-03-13T13:56:21.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d1bc2cce-a622-49f4-aeb8-5b953ef057bd", "target_ref": "x-misp-object--320498fb-361d-4be2-bf24-c44442ba1d43" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1ff81d83-50ff-407e-a0d7-23591345be8d", "created": "2018-03-13T13:56:21.000Z", "modified": "2018-03-13T13:56:21.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--139c2340-d819-4e2a-b7ef-5db4b5456996", "target_ref": "x-misp-object--11fc4165-9256-452c-bd57-91eea67d52f7" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5f9842c4-5ddf-4880-bfba-5fcb37166899", "created": "2018-03-13T13:56:21.000Z", "modified": "2018-03-13T13:56:21.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9a4100e0-80fa-4c58-8ea4-c72ae84eabea", "target_ref": "x-misp-object--529f731b-28af-4b92-a2e5-02df29872815" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2b35e23c-005b-40ad-b453-e3759524702c", "created": "2018-03-13T13:56:21.000Z", "modified": "2018-03-13T13:56:21.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--136020bc-9d22-4ff9-8ecc-0593daa5cdc9", "target_ref": "x-misp-object--a0368a1c-1331-48d8-be77-72246033e74d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7170b96e-9083-4ba5-954a-ad9d909a166b", "created": "2018-03-13T13:56:21.000Z", "modified": "2018-03-13T13:56:21.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--df75d959-0373-4dcb-9d03-661b2e89367d", "target_ref": "x-misp-object--dd4de532-cdff-43db-9b08-383978d10ecf" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ec55c276-0313-46ae-a7bb-855e2f97a328", "created": "2018-03-13T13:56:22.000Z", "modified": "2018-03-13T13:56:22.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7cf04113-a5ef-4039-a3e1-ffe4ec7290a3", "target_ref": "x-misp-object--b9d2a895-a418-495d-a507-6ed53e60da61" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--18e9b400-c18d-4744-9149-1a79fb638782", "created": "2018-03-13T13:56:22.000Z", "modified": "2018-03-13T13:56:22.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2921db48-769c-4001-86d0-7f439fd5895a", "target_ref": "x-misp-object--744bd821-f292-4972-a1c0-9ef1cb1501d8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7300bb8c-af54-4809-906d-5de8da83e250", "created": "2018-03-13T13:56:22.000Z", "modified": "2018-03-13T13:56:22.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3b4dddf3-912b-4a36-a71e-036980f6e913", "target_ref": "x-misp-object--7f3cc856-802d-426c-8c22-246dc019e2cb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9243d86f-6e6c-45a8-85e6-2c71ba267209", "created": "2018-03-13T13:56:22.000Z", "modified": "2018-03-13T13:56:22.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e12bb0ee-a69a-4146-b055-56ca6d2cc0fc", "target_ref": "x-misp-object--9489f5d2-ff71-4fd0-815d-78330163a252" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--cfca3568-c290-4934-b476-fd002d7ea8d9", "created": "2018-03-13T13:56:22.000Z", "modified": "2018-03-13T13:56:22.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2176c24c-867e-4722-a4f3-93baf925f23b", "target_ref": "x-misp-object--01a3a067-3cd9-4ad4-9d0d-edcfaeff95e9" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--233bbb31-5c21-48d2-98b2-fbb16d8517da", "created": "2018-03-13T13:56:22.000Z", "modified": "2018-03-13T13:56:22.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d99541c3-21f9-4e43-a072-f9f348acc61a", "target_ref": "x-misp-object--004be45d-0741-4968-86ee-422470e10454" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6dda2a5a-7da0-40fc-a444-06ece65e6903", "created": "2018-03-13T13:56:22.000Z", "modified": "2018-03-13T13:56:22.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d3259046-b495-487a-ba1b-213849af711b", "target_ref": "x-misp-object--84bf6f44-a6f7-4787-b77a-8aa652de24d1" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--576e4981-1565-4073-b985-26a072c45d0e", "created": "2018-03-13T13:56:22.000Z", "modified": "2018-03-13T13:56:22.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4b42b7ba-a997-4165-ba35-d68532e67774", "target_ref": "x-misp-object--17a3fa4e-9caa-4187-a01f-829a2a81b273" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--92efef89-c69c-447c-b161-410765bd2d91", "created": "2018-03-13T13:56:22.000Z", "modified": "2018-03-13T13:56:22.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--af041428-4279-46bf-93f7-95a9ae7e9ac0", "target_ref": "x-misp-object--a4eaa802-abe1-41ad-8dd3-d0ce3294cb7d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0af6ce04-7991-425b-a4ac-6a71cd7d4ef5", "created": "2018-03-13T13:56:23.000Z", "modified": "2018-03-13T13:56:23.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--908010cd-28a0-4f08-a7a5-69281f864864", "target_ref": "x-misp-object--d989e4a7-23b0-46e7-813f-00cdf793e023" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--211469a2-7a70-4a01-bbae-1404d288ef02", "created": "2018-03-13T13:56:23.000Z", "modified": "2018-03-13T13:56:23.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2df4ad14-cdee-402f-9b29-66314a34cfca", "target_ref": "x-misp-object--ae6eff32-1af2-4531-9939-8eefe6ee25dd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f9b25375-f75f-4d4e-853e-5be476a9a5dc", "created": "2018-03-13T13:56:23.000Z", "modified": "2018-03-13T13:56:23.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4ebe1cd8-46c9-4f31-a5df-525f4d91d446", "target_ref": "x-misp-object--1c2bcd49-2485-4949-a704-8b12e30d65e3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--076e9f85-26b7-412d-b8e5-5b87baf482f2", "created": "2018-03-13T13:56:23.000Z", "modified": "2018-03-13T13:56:23.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b0da95dc-a85b-498e-a0f0-679b8220ab3e", "target_ref": "x-misp-object--11c2e221-8fef-48d6-a2d4-9699d52ca330" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c0652b3d-34aa-4813-a549-074896a1d2d4", "created": "2018-03-13T13:56:23.000Z", "modified": "2018-03-13T13:56:23.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--fac77102-1466-4b49-af45-0081aa168519", "target_ref": "x-misp-object--b430aab1-6ef2-4ec5-9720-0805c1640c39" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b49fd571-a2a0-4599-9167-10afb16cad84", "created": "2018-03-13T13:56:23.000Z", "modified": "2018-03-13T13:56:23.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--45b7e720-e0f0-4621-89a8-be81720d360f", "target_ref": "x-misp-object--2e00b881-7805-493f-9af6-3dd03df10987" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--774bdbc9-9d2b-4402-9fb6-3233f18712d4", "created": "2018-03-13T13:56:23.000Z", "modified": "2018-03-13T13:56:23.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3f8e9ff9-7ad7-4167-acc0-a2ceffd681c1", "target_ref": "x-misp-object--b44e8fc7-c3df-4948-8559-55c3cfa79ffd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6b1fa41b-466d-4313-9790-5860649443ce", "created": "2018-03-13T13:56:23.000Z", "modified": "2018-03-13T13:56:23.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d2507aa9-43ee-4889-aef0-76757a8cbd64", "target_ref": "x-misp-object--dec03b16-27e2-4093-ab38-a00a27bc5a16" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8e5d0ac3-70a9-437d-9727-dd4b596241ba", "created": "2018-03-13T13:56:23.000Z", "modified": "2018-03-13T13:56:23.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0de0053d-c9e3-4ca6-90ef-f56a945de1d7", "target_ref": "x-misp-object--49283bd7-ffd4-4c00-acad-f7b0e61e4a15" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f0d79dbc-64bb-439b-a880-4742d2ff699d", "created": "2018-03-13T13:56:24.000Z", "modified": "2018-03-13T13:56:24.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f188e92b-8a5f-4399-b9c9-e745b9398888", "target_ref": "x-misp-object--f3765bba-c4df-4ada-9640-73b6b56bdcd0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f6d302c6-57a9-42c6-8809-9383aa05ada9", "created": "2018-03-13T13:56:24.000Z", "modified": "2018-03-13T13:56:24.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ee9122b3-2621-4f5d-8f22-6936733b76a2", "target_ref": "x-misp-object--66faec5c-f35f-4310-ae76-b5d133c3d514" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--776693a7-8294-4780-a8b3-5e9c6ffc0220", "created": "2018-03-13T13:56:24.000Z", "modified": "2018-03-13T13:56:24.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5d5cff29-0013-4f58-a217-5ffc70a9b467", "target_ref": "x-misp-object--8ba5aae0-fca0-4615-a91c-db32cf0e838c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e8a46355-f74f-4047-a6e0-f36d883ca1ca", "created": "2018-03-13T13:56:24.000Z", "modified": "2018-03-13T13:56:24.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d5de0f3b-09de-463d-85b3-3348fc8a6331", "target_ref": "x-misp-object--2c00b6d5-4b71-4749-8627-c2f99359e324" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--bb5b6ca1-ce5a-48f1-aea1-03c4015983d1", "created": "2018-03-13T13:56:25.000Z", "modified": "2018-03-13T13:56:25.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9e409b3a-5452-4c05-bdb6-83a7b07e379e", "target_ref": "x-misp-object--ceebf3aa-a6a1-42f9-b4d7-bc07e1c353fe" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0374e58f-381f-4ca3-896e-cdbb1c2f40c1", "created": "2018-03-13T13:56:25.000Z", "modified": "2018-03-13T13:56:25.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a0a7273f-3c33-4691-8ebe-3ce2b0d33c72", "target_ref": "x-misp-object--b8e6eadf-5c37-4201-9195-f248b9a9ea9c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--070846f2-f1b9-41cc-97f9-91aedf97086f", "created": "2018-03-13T13:56:25.000Z", "modified": "2018-03-13T13:56:25.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--43c21a39-d823-44b8-831b-c36317700f44", "target_ref": "x-misp-object--6186ed82-e296-4016-b6ca-b6fefd19587e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6be8ef60-3fe5-4c39-95d6-41591d1387c2", "created": "2018-03-13T13:56:25.000Z", "modified": "2018-03-13T13:56:25.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b1fe42d9-2519-44d7-b1a6-87056aa9ec7e", "target_ref": "x-misp-object--f994c47c-ea40-412b-8854-d748ec104625" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1ed96be6-f044-428c-872f-9c6c53e66b13", "created": "2018-03-13T13:56:25.000Z", "modified": "2018-03-13T13:56:25.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--399781fe-7ce3-48d4-836f-35080235fe53", "target_ref": "x-misp-object--f08dfd7d-fe11-49fb-b4aa-29990ca09262" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2bd22249-d34a-4dc1-bf17-91b32fd7a86b", "created": "2018-03-13T13:56:25.000Z", "modified": "2018-03-13T13:56:25.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a8903b85-2d3f-4c0a-a072-de47670e4c51", "target_ref": "x-misp-object--6336762e-38ab-431d-892c-11eb2ca40cae" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f3d0c161-811c-4053-b4d5-9d60a910171f", "created": "2018-03-13T13:56:25.000Z", "modified": "2018-03-13T13:56:25.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ca64f9b1-2a0a-4762-8f9e-65670a29d957", "target_ref": "x-misp-object--c15a3bf5-7ff8-4325-af1b-f8cfc5ba01d2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--44f68702-6054-47ab-b2f3-f66d9e3f88f5", "created": "2018-03-13T13:56:25.000Z", "modified": "2018-03-13T13:56:25.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--10f161a8-d5a3-4e19-8ba6-31e105782123", "target_ref": "x-misp-object--671f2cb9-b54e-4da9-bcb3-960d30dedcb1" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c7fca1f0-9fad-4542-a4c4-d1b413d75a8b", "created": "2018-03-13T13:56:25.000Z", "modified": "2018-03-13T13:56:25.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--07bf697d-c098-4b87-acb7-f4634bc6638c", "target_ref": "x-misp-object--4df2a5d7-3d89-4706-8ffc-c322b2069332" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c1a7b96a-f8ca-432e-92c2-951d54153172", "created": "2018-03-13T13:56:26.000Z", "modified": "2018-03-13T13:56:26.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4f394327-9de3-4f16-bd7e-67ae011e2253", "target_ref": "x-misp-object--c4e37357-07eb-44fe-a2a0-dcb9ebfef7e6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b80180a4-b7f7-4476-b690-61f5cad1ccd7", "created": "2018-03-13T13:56:26.000Z", "modified": "2018-03-13T13:56:26.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3905e8e1-d889-4208-8cc5-e6f3b7f9056e", "target_ref": "x-misp-object--41093629-a5d7-493d-8c2b-f479a8fa8529" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b84068dc-e444-4b9d-a826-08bcd40c37c4", "created": "2018-03-13T13:56:26.000Z", "modified": "2018-03-13T13:56:26.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--80aa0c4d-56c4-4304-86c2-8a23da2f8ce9", "target_ref": "x-misp-object--8bcd1506-8712-4d28-9a58-ca9647175c66" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8287779e-c81c-42d0-9ff1-1fa17ee079d5", "created": "2018-03-13T13:56:26.000Z", "modified": "2018-03-13T13:56:26.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b5f6d323-9417-45f7-a465-2f585eda42b8", "target_ref": "x-misp-object--45739206-d155-4d6b-af93-2f86cb8ac7dd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8309fe3b-c397-4546-9cb2-a1953305fa21", "created": "2018-03-13T13:56:26.000Z", "modified": "2018-03-13T13:56:26.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9d007af0-b71c-4b34-92e6-57a09987bbe2", "target_ref": "x-misp-object--8da16671-3dec-4c2a-931d-e88fa1bdd9ee" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9b58bd89-ab17-403c-a64f-7cd63c7f180b", "created": "2018-03-13T13:56:26.000Z", "modified": "2018-03-13T13:56:26.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--49b74b3b-9e5a-41c0-9cc6-1ceeaf82fe66", "target_ref": "x-misp-object--3301e1c0-2d4e-4f28-944a-6c156a8eb79c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--58d32771-d3bf-4bdc-a068-9fa4edd9250c", "created": "2018-03-13T13:56:26.000Z", "modified": "2018-03-13T13:56:26.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--895f0bf6-c013-48e3-8d00-7055d79eec53", "target_ref": "x-misp-object--6d232c0f-d48a-4b00-8bcc-5d72e80bcacd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--258107db-0b69-4f7e-8110-9e200d80e298", "created": "2018-03-13T13:56:26.000Z", "modified": "2018-03-13T13:56:26.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1a3ff89e-aa94-4403-9b1f-c8b939f194f1", "target_ref": "x-misp-object--22395f70-e94a-43fe-a45a-d4e21ebc289f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4dcf353b-4317-465e-b589-393576d69ac0", "created": "2018-03-13T13:56:26.000Z", "modified": "2018-03-13T13:56:26.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8d76e8fb-32e8-4b38-a540-8ab6539c1a13", "target_ref": "x-misp-object--d6a57e30-b781-4431-96c7-a3922f77c64f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--46301d68-14dd-4f24-805b-e1951f2624e7", "created": "2018-03-13T13:56:26.000Z", "modified": "2018-03-13T13:56:26.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8ddfa5e0-c492-4661-92cd-e927230d5b3d", "target_ref": "x-misp-object--ea151dbd-2122-4785-9e0b-4adee906b295" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3fe496a5-cfa9-481a-8c11-fe3f24244203", "created": "2018-03-13T13:56:27.000Z", "modified": "2018-03-13T13:56:27.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--848a653a-0ff6-4b48-aa3f-ed315f673c79", "target_ref": "x-misp-object--44e7f385-7e2c-419d-a1cc-9a62e0cb1be0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--aa70041c-76a3-4e5c-a884-a7b5f13a1440", "created": "2018-03-13T13:56:27.000Z", "modified": "2018-03-13T13:56:27.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--79a94358-05a4-4a42-80fa-7449e6261551", "target_ref": "x-misp-object--692fc00c-4eb6-45d1-9772-d705f620d05f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b17d6c74-b2ee-4d72-904e-8f21ca608a81", "created": "2018-03-13T13:56:27.000Z", "modified": "2018-03-13T13:56:27.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--de1f9e1e-cc20-4d3d-ba3d-ff289e81ea2e", "target_ref": "x-misp-object--bd207aa7-e09f-470d-81da-8745020f58d5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--330b7ae7-c5ba-4ebe-a90f-c1cc254140dc", "created": "2018-03-13T13:56:27.000Z", "modified": "2018-03-13T13:56:27.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--dafda082-ec7e-46ff-a7c8-41af48f58dbd", "target_ref": "x-misp-object--79f3e338-4702-4264-aa1c-c03b057e5207" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9365a854-d907-47e3-b955-b1188036d6cc", "created": "2018-03-13T13:56:27.000Z", "modified": "2018-03-13T13:56:27.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--89038c85-d67e-4771-afe8-5a91d9d6edd4", "target_ref": "x-misp-object--36eac465-9951-41e9-ada5-3b203a4ad794" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--27908755-a66d-4127-8b80-398bc4b25db9", "created": "2018-03-13T13:56:27.000Z", "modified": "2018-03-13T13:56:27.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--dcca29bf-3545-4c53-8410-5f92da6d4820", "target_ref": "x-misp-object--8a9d68e7-d771-4af0-a4a6-4fb30dbfea47" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--be3c7e2a-7650-48cf-8915-59a47dc4dfd1", "created": "2018-03-13T13:56:27.000Z", "modified": "2018-03-13T13:56:27.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--acb977e6-4468-4ac7-b23f-21c5f5636112", "target_ref": "x-misp-object--4fe83c08-1055-407a-b799-ded69ab4fccb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5de1a145-c784-4206-a6a0-7ab1ec8158ef", "created": "2018-03-13T13:56:27.000Z", "modified": "2018-03-13T13:56:27.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bd503999-5a9e-43ea-bb23-776ad89490bf", "target_ref": "x-misp-object--a47bd8da-bdbd-4aed-9eef-a11e36096b26" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--494424b6-b0bd-4f60-a602-8878b4cd63bb", "created": "2018-03-13T13:56:27.000Z", "modified": "2018-03-13T13:56:27.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--00af6957-6e5d-4518-a3ab-78db7b785812", "target_ref": "x-misp-object--e9de06fa-e36b-43b5-b5da-9da311f24fe0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--32e32d68-481a-4c42-9de8-865334c7430c", "created": "2018-03-13T13:56:27.000Z", "modified": "2018-03-13T13:56:27.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5250e462-e606-43b3-af21-b25d353ca77a", "target_ref": "x-misp-object--6ae57d88-3897-4d06-aea0-539f68acd4f0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8935607d-23b7-4219-bcf6-a4d349b8caf2", "created": "2018-03-13T13:56:28.000Z", "modified": "2018-03-13T13:56:28.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4fa3da7c-2e32-4789-aeab-967e4c7043f2", "target_ref": "x-misp-object--75254811-0801-4316-b27b-df50b7439502" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2fc10f20-fe46-44df-8d78-4f02a2815483", "created": "2018-03-13T13:56:28.000Z", "modified": "2018-03-13T13:56:28.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b10a1850-a549-42eb-a281-15589b9804b9", "target_ref": "x-misp-object--e131e510-e043-4d38-a582-391c654a491e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--63fee1b6-b272-4a41-8dd0-0df2b36ea10f", "created": "2018-03-13T13:56:28.000Z", "modified": "2018-03-13T13:56:28.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f6a62907-ffae-4a96-b58e-a54dc45bdd71", "target_ref": "x-misp-object--73293f69-441f-4861-8668-9babeecc2ab7" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--74462801-29f0-4d69-b0ad-4235e4b89ed5", "created": "2018-03-13T13:56:28.000Z", "modified": "2018-03-13T13:56:28.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--da8a4dce-3681-4781-9bcf-b6cece8ddcee", "target_ref": "x-misp-object--f0b4badf-9446-4115-bd57-b2a66f55f470" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9900ee62-275a-4ba1-a714-0f5f1552c9e2", "created": "2018-03-13T13:56:28.000Z", "modified": "2018-03-13T13:56:28.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--dc5355e8-5eab-4718-9235-f1b551b863a2", "target_ref": "x-misp-object--2d79df26-7862-4e28-acf6-b6b1a331755e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fcecc279-5b3c-4deb-9d86-9ca139b749e8", "created": "2018-03-13T13:56:28.000Z", "modified": "2018-03-13T13:56:28.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d5911876-ca1d-4b22-8c38-7119fca9fa0e", "target_ref": "x-misp-object--487e2e6b-c536-4df1-accb-a29b42e96b2c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5a27e91e-c123-46df-93c4-049e086c00cb", "created": "2018-03-13T13:56:28.000Z", "modified": "2018-03-13T13:56:28.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0e4cac6a-d9b5-4118-bde4-60ad3a609a8f", "target_ref": "x-misp-object--146e4c31-21b3-46fe-b8de-7f769392972f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6ac440a3-1c0c-41b7-af76-42f688983f04", "created": "2018-03-13T13:56:28.000Z", "modified": "2018-03-13T13:56:28.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f0b0d5df-1bae-410a-9926-6a0e64f64ff6", "target_ref": "x-misp-object--69b924fb-8254-413e-9800-544b82939ba8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2867ae1f-2f81-407a-a8da-0e40f677b077", "created": "2018-03-13T13:56:28.000Z", "modified": "2018-03-13T13:56:28.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--26df4a37-ab0a-4532-96d1-f2e7c0109bd1", "target_ref": "x-misp-object--5e7ba62c-dec2-4434-9031-ecbe140bfe09" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--23cd48c0-02e5-4b12-bc6b-34e675e37e30", "created": "2018-03-13T13:56:28.000Z", "modified": "2018-03-13T13:56:28.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--077ac4ee-08ca-446e-88e3-c860f15d6e42", "target_ref": "x-misp-object--19dbb91d-5dc1-4a68-beb7-2855a8b55944" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f3040069-bef0-433d-aa21-1213b3e6a917", "created": "2018-03-13T13:56:29.000Z", "modified": "2018-03-13T13:56:29.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--16be79c8-3fcf-49ad-9a56-0c21f71a340a", "target_ref": "x-misp-object--89a77099-d59d-44d4-8a59-0738bb796d43" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f89f038e-241c-4f73-9bf7-7647201035b3", "created": "2018-03-13T13:56:29.000Z", "modified": "2018-03-13T13:56:29.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9652d6e1-a194-4a6a-929c-e7e956850f89", "target_ref": "x-misp-object--52a4df42-1337-4088-bf56-b667387402a3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--51050a65-921f-4b42-ab10-8c64c9018602", "created": "2018-03-13T13:56:29.000Z", "modified": "2018-03-13T13:56:29.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d1d8a404-37d2-4f24-9178-8bc2dbe65ccf", "target_ref": "x-misp-object--97568f59-097d-4e72-b4dc-fd68c408c85a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c20a529b-10b5-4327-9986-2aafc2c1d1ed", "created": "2018-03-13T13:56:29.000Z", "modified": "2018-03-13T13:56:29.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--03e306e0-62ae-4534-912a-59d311bc5ccc", "target_ref": "x-misp-object--9b39352a-bfd8-4477-ac80-b9092c06bf88" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9e65cc94-b1ed-43de-9899-5dce47b5d171", "created": "2018-03-13T13:56:29.000Z", "modified": "2018-03-13T13:56:29.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3d85b1c8-be3d-4656-918a-168f4f155069", "target_ref": "x-misp-object--1c6103ea-83ca-4a82-aeda-c4aa8f13e23c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ddffe33f-39dc-4939-99b9-07cdcb09c9b0", "created": "2018-03-13T13:56:29.000Z", "modified": "2018-03-13T13:56:29.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--04b2a401-b201-464d-810b-88383d077361", "target_ref": "x-misp-object--aa6b3be5-ea62-429f-8e69-13ae6bed6d86" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--54f602ed-e6f0-4a7b-b2b7-7d99e99e5b86", "created": "2018-03-13T13:56:29.000Z", "modified": "2018-03-13T13:56:29.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--882870ac-fcf6-4458-b142-3c80c26ccbe9", "target_ref": "x-misp-object--87ca3a43-63b2-4b36-bc14-b1d410544873" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5ffa63f7-0c83-40c2-b7f9-dfb2af9c5acb", "created": "2018-03-13T13:56:29.000Z", "modified": "2018-03-13T13:56:29.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d054c158-41ed-4da9-a47d-6a27d632286f", "target_ref": "x-misp-object--a3318579-3b87-4794-aa53-dceb5cb0f91d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--758e4575-851f-4552-a83a-7f2c32f543cf", "created": "2018-03-13T13:56:29.000Z", "modified": "2018-03-13T13:56:29.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--56f36f82-1ba1-4809-a5e7-90cd21f3aaa0", "target_ref": "x-misp-object--f5228bc9-0596-44c7-a7d1-fb756784412d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0197f090-1007-4c75-a0f8-188e019178f1", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b91e8990-cf2b-407a-8991-bbb3608c6b9e", "target_ref": "x-misp-object--f83f28b9-063a-446a-8f9c-38f9c269399b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--dbb0a0a9-0818-4757-8bdd-4070612335b4", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e4a9332e-e3d0-46c9-ba7d-ca1c7293848e", "target_ref": "x-misp-object--320ba851-d81c-484f-894a-701364ece4c0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--07d8ac54-6aad-42af-8d94-148a65a4ca18", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b3324698-2b4a-471c-b45b-e2f397b81af6", "target_ref": "x-misp-object--077cc537-080b-4c47-bf21-7df045b20744" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3024a412-346b-447b-b401-4212da05668a", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9fa8595c-97de-41fd-9276-d562acbefb96", "target_ref": "x-misp-object--dd2d5a11-f02f-400b-9d17-a9e9147288ee" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1767b02e-49dc-4251-b4bc-9143b867727a", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--446c3020-b0e4-492c-bd12-7066f1104d9d", "target_ref": "x-misp-object--0888e8dc-2d19-41be-b507-e64d24336064" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--77e2c670-e83d-436f-91aa-406bf2871df3", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ec43784b-9ba5-4e7f-8dfe-5a027d2a39c2", "target_ref": "x-misp-object--66b5dbaf-aead-471a-be05-03d7ceecff15" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e713f53d-c95c-4f71-8567-c45da92f4c57", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2a2a5f55-bf30-419d-8aca-626ac8cff579", "target_ref": "x-misp-object--feeab5d5-1436-4855-9ba9-bfd9f5c956ec" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--89433ef7-d2d5-4501-9c94-d8cd8a73ff00", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5db9b3d7-9465-4c17-96f8-f5ed425224aa", "target_ref": "x-misp-object--f9c1b826-7799-4c2c-a723-07377a3d1bfd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--cea448d5-271e-4caa-b411-98b82bc4d902", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3be79107-b34a-4c7f-ba2c-fef85b1cee8b", "target_ref": "x-misp-object--166bda7d-6c12-4ddc-a33f-2d4ef0d3ec3d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--21c9a45a-293b-4328-b8ec-2a19d49f3a1c", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6baeead3-c809-41df-b607-ca5848e68fb1", "target_ref": "x-misp-object--f491f23c-43cf-4453-87db-3607b86510a4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f669556c-a9bf-4050-b4ad-d91af57f9b63", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ae8e3d01-4e47-42df-9607-9167544acc06", "target_ref": "x-misp-object--5062fa66-2e6c-4fe1-8aa7-43cf26de6aad" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9f23593e-a3ec-4e91-89ac-fc99ec4d25f5", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7fb8d9ab-db52-4104-8f75-f38f288d8b1e", "target_ref": "x-misp-object--4ee3557a-7d82-4325-9be5-ce3d1ad60f98" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--efee55f2-b24a-4196-b684-c98f692e8aae", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6f20eba9-8ddc-4fd2-8308-09ad81eab0c7", "target_ref": "x-misp-object--be45c6a2-715c-4c95-9375-97988cb782a5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5fe3a49d-ac4e-430c-a41a-7e3f65ecc673", "created": "2018-03-13T13:56:30.000Z", "modified": "2018-03-13T13:56:30.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c8442b78-eb30-4e6b-82f8-c493beab29ad", "target_ref": "x-misp-object--b15ff2f5-a898-4dbf-92ef-2630c13bcb9f" }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }