{ "type": "bundle", "id": "bundle--6021536f-a808-4b9c-8136-d7460aba047c", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-11T11:00:12.000Z", "modified": "2021-02-11T11:00:12.000Z", "name": "CERT-FR_1510", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--6021536f-a808-4b9c-8136-d7460aba047c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-11T11:00:12.000Z", "modified": "2021-02-11T11:00:12.000Z", "name": "[CERT-FR] Infrastructure d'attaque du groupe cybercriminel TA505", "published": "2021-02-11T09:45:52Z", "object_refs": [ "x-misp-attribute--8a948ce0-c2c8-4e2a-8c67-73757b48474f", "indicator--87ca8c58-8696-4752-8b62-34c714be0ec0", "indicator--be9d342e-4921-4e85-afd4-f8201e059fb0", "indicator--040b18be-531c-4297-bb5b-a69595c36d96", "indicator--e69552e9-3236-4222-9cd3-10b0fddaa6dc", "indicator--b50dda3c-65d6-4ff3-97ef-1ea1e2cdfffc", "indicator--9e7b230e-24c3-4cab-a4e4-7e4646f0f080", "indicator--abb56917-cdb2-4b03-bebe-a6f59ff126ff", "indicator--3b70dc09-21b1-4eb0-a928-cc5111f14d95", "indicator--e944d50a-d898-42b4-a2b9-d4d8b2e1753b", "indicator--a1c721c6-6f26-4145-a402-34c115b7a19b", "indicator--b6267eb6-8a68-418b-bf0e-3eef8c759733", "indicator--406df6c9-7eef-4e2f-a752-5c1de09e8dc7", "indicator--cf8ea963-4fc6-49f6-b527-fa2369256ed0", "indicator--45825169-fa00-4347-acd9-ce3b0b3373fc", "indicator--8e7055a2-a143-4ee2-bc02-6395d2f5a5fa", "indicator--a90b7ffe-659b-46dc-b65b-c04d677325c5", "indicator--573d2e84-91f0-4146-96c1-5ce580b9aa70", "indicator--354d0ab3-88c3-479b-8e20-b9aff14d42f8", "indicator--1ffe4154-7123-43c8-9914-c36e5aa076e5", "indicator--f9a1b32a-8919-41fe-91c9-51da8900a005", "indicator--7164c0cf-1fa7-4484-b659-2903679186e3", "indicator--4dc60509-682a-44e0-a4fc-3c7461e6dd57", "indicator--33b81673-0741-4553-99b6-f96ebf796c67", "indicator--b50afc63-83df-4712-be66-2bebed391e29", "indicator--60514e79-296d-493e-b924-fcd68d2bbf05", "indicator--33026849-2e8a-4dbd-8c2b-9b3d84140214", "indicator--ab65bc08-32bf-44a5-8d74-72315fa643ab", "indicator--f89233a1-20f2-4a3f-bc04-c1e90b988cb3", "indicator--aeb40c17-e1dd-4fa8-9aa1-9183148ba5b3", "indicator--e431439f-cba2-4ccb-988b-7dddb175502c", "indicator--1e7256d7-3aff-4b3c-b653-d8c7673fe2c5", "indicator--3e177ad5-6b94-4bc8-b772-4061d63d2c75", "indicator--f2204f52-d094-4f88-b850-ef46031aca37", "indicator--05c81d51-8984-4898-ae12-f8e9db99ad34", "indicator--859590e6-313b-4b76-9e2a-a7653be3d90c", "indicator--cb4ec068-2ce9-41cb-bb5d-441edb9f7958", "indicator--b4e69725-e167-4a17-be0f-3e31750abd4f", "indicator--1d90023f-6c6d-4caa-82f2-5f688c3aa6a9", "indicator--ecb2b106-7ecb-4dcd-93e3-897043a7615c", "indicator--eebfa6e4-0031-4d51-8a5d-5852164e2ebb", "indicator--21a67340-19be-4865-891b-9444d4d69e35", "indicator--d654f256-aa41-4b06-bf68-7db5284e0ee5", "indicator--279ef0ba-e00e-48ae-a59c-3eb61d5113ec", "indicator--79e1a58b-6406-4d53-9bd6-8f240837114f", "indicator--a7e201bb-4a05-4f02-9fc4-839f103e97c3", "indicator--a4713845-ac4b-4a78-875b-fdf1650fbbac", "indicator--70db6701-037a-44b0-9c2f-fa393eecea11", "indicator--3f51eb81-496f-48a1-b730-e8b3fa06cb92", "indicator--c0072af5-6d80-430d-8b8e-1e4a60ef4132", "indicator--319bfce4-1b0b-4256-b551-8146097d251d", "indicator--270b486b-3e52-4199-8e74-c653e900d244", "indicator--fee0967b-0a9f-4fa6-844b-5f7619cea2b7", "indicator--d254c49f-3918-4f2d-a393-abf074d4a59f", "indicator--bcb8878d-9773-48e8-b993-462e39940727", "indicator--94c95735-a074-4364-a824-90e67cdcf381", "indicator--a06f406e-7302-4666-b5b5-a92571a91095", "indicator--0b3e2cc1-f287-47c0-b6f2-bfcfb6a1b033", "indicator--5eb3340d-b602-40b0-8175-81398b88eafd", "indicator--44de8360-a6b0-432c-87f4-512971037aaa", "indicator--b3f1e177-e34d-49f1-a403-dffa7c6fa27e", "indicator--45fd1f4b-1f20-4429-a746-d4c2348f64d0", "indicator--924f20bd-8154-42c7-88cd-0dd0979bded1", "indicator--c4843f3a-cd59-433c-b2ac-8f1b7c8100e1", "indicator--403af9dc-5477-4d70-adea-fcd2304bac7a", "indicator--4bad8ba3-5178-45a3-894f-3057f10538e8", "indicator--9890c8b9-aaf7-41a3-a9e7-12b3b096470a", "indicator--980c81f3-e780-4463-9731-cf83d355c25e", "indicator--286437b7-a58f-4d9f-8101-c61a0a673b4a", "indicator--96e25de7-fc29-4f29-a80b-ebb4b173c686", "indicator--916ab6c2-c568-4efe-9c55-40c08049ecab", "indicator--2915857f-b6b0-44c5-85fd-4a72b0771ec3", "indicator--5162ae33-78d3-4112-8fbf-34d9d8b9b6b4", "indicator--43ceaf6d-6d9e-4f44-a10c-ae650a513595", "indicator--ea78b23d-0c6c-4bbd-b1b3-432d7e32c392", "indicator--ada1b5cb-32a4-4b24-a60d-9372e55d1fd0", "indicator--80319433-0eee-47f6-9bf4-fc600d13934b", "indicator--327c1ba1-a381-490c-b82b-f78261d88b69", "indicator--f6510191-8364-4e0a-ba79-cc5b98fb01d4", "indicator--b8649d50-42e2-4da5-a3ba-bdbab35172a5", "indicator--2c691f11-c9d4-498e-be07-0e368b402711", "indicator--c7a8262c-8769-43ea-b680-9847df435fff", "indicator--1310e8ee-5470-41f0-b261-25f8ef4b73cb", "indicator--28a1cb04-3bd5-420a-8e93-10e458fdab67", "indicator--c0eee752-ad8e-43a5-a5a6-05a203799ed5", "indicator--3a7cf6b5-6505-4f06-876e-460234b4b1cd", "indicator--049819a6-f515-418f-ae8b-0791e5c54471", "indicator--77e9a166-859d-4c1d-bc9c-83050e512442", "indicator--cb8b17a0-2a6b-43ac-ab2f-f424ae8106b3", "indicator--9b309ece-8dff-4c12-a2b0-6a542b303ac2", "indicator--c174c903-973c-412d-b0f1-db21420b80ef", "indicator--ba5066f0-9af9-4a0d-b8fc-9a79ee999211", "indicator--dc362b7a-0cd3-48b2-922a-7b3e77d99898", "indicator--d1b245ab-8562-41d9-a398-96c2d4f1c19c", "indicator--6b1f6594-f757-4b13-8c98-1f4d4f90d481", "indicator--5bd69ccc-3aa4-467e-bf46-7a64114a55f2", "indicator--491d00be-9d4f-4b56-b547-2ae7b2b5cac4", "indicator--281bb75d-4489-44d4-890f-4bd1c740263e", "indicator--ed326b90-395a-4634-a88f-6b7a2e5f02b4", "indicator--849e5f07-f9fc-49c0-9cf8-6740ae8af400", "indicator--e7147c71-3418-487b-8689-63b8db0d9575", "indicator--e6f2b50b-ba16-473a-b1d7-26b7c0bd8a00", "indicator--1a623117-9834-43be-af23-3fcdc65febe5", "indicator--949748c2-a635-4260-992b-2e1d94b8f1dc", "indicator--87c6dc36-162b-4fc4-a286-dff55b75d7c6", "indicator--34a8f9cf-762c-41ba-b4c1-eac62708dd7f", "indicator--73054c9d-c3ef-4de7-b339-128849ccc88d", "indicator--1be46a93-b950-48fe-a42f-e2b8d904dc87", "indicator--c78dbee1-520d-4e00-8439-261934be3fe5", "indicator--b97f726a-2bfa-4736-b27b-17bf9d179724", "indicator--8f666e9a-635d-49be-9e6b-8eaf5696fe1e", "indicator--ab94efd4-6dba-4b43-8b46-cf4fd60a3e34", "indicator--e38205e6-2b49-463d-af76-52d46f08472f", "indicator--9893de46-6972-4e6e-8746-d07cda98bbac", "indicator--877be12a-afb7-463f-935e-15bfa2aeae6c", "indicator--38d6f0b3-8486-450b-87da-4dc8ea5b7534", "indicator--2fd30988-e13a-4db8-8c8a-63aec004d62e", "indicator--3d320cb1-66d2-4a71-a7c7-a94b4096555c", "indicator--dc01f983-990a-41b0-a2c6-2a9b30852df5", "indicator--26171675-e97c-4fd3-8b01-2b88538e71a9", "indicator--6eaef210-9788-4f78-b55e-48bc2c6f2493", "indicator--8f289f69-8528-454f-8729-302b1be01a46", "indicator--7eccc282-19c3-4e3a-9f6a-c99c23d9ec42", "indicator--9a36943e-1c3c-4efb-82e1-300f7f576a84", "indicator--d8f34d4e-4679-401b-8863-4c7f6f74785f", "indicator--4dc9420d-d2a8-46d5-83a2-0e71a28d5600", "indicator--6a69044f-eb49-4aa3-8df8-c713f56a27e2", "indicator--487f5f41-1573-4b4e-8b61-08dbc1b93cdf", "indicator--b71f6526-bc1f-4c62-90cd-19ef086af15d", "indicator--c06a0e3e-bb24-431f-894d-b9ab90812b6c", "indicator--0d9ebc37-2db9-4e8b-a6b1-e4b0cd78da35", "indicator--f272b94f-90fa-4271-9cf5-1f34c9b4b14a", "indicator--110ad250-9355-4cfd-890d-aab17f9e4cd8", "indicator--705a3929-f729-440c-82c8-4008b45b1978", "indicator--077b4ce8-8666-4901-ad61-55e4a72c3bd4", "indicator--27630fb5-2bdf-4e16-b3ba-962a2a79ec4c", "indicator--2f7df412-29ea-48ed-a612-e986d82a4c66", "indicator--3d7324ff-ae65-4a9d-96fe-bf852e55f78e", "indicator--331c536d-b247-423d-9e31-b7ec3ad65a41", "indicator--204eca70-db1f-4cd1-bc88-6bf76aa8495b", "indicator--ab74549d-9606-4514-b09c-47d84ba60d7c", "indicator--b8911d36-92c7-4237-9997-cfa9a3a7335f", "indicator--7d5be3bb-da30-4d1b-89c5-190952432c2c", "indicator--df4d978d-bbc3-4b95-a389-76c6bed52b25", "indicator--0af623bf-90f4-415c-b358-dfe11818cda8", "indicator--7444ed8f-5ded-458d-a788-2d638dbce8d7", "indicator--5d6dd13d-6511-40a1-937e-75bee78d289c", "indicator--1b0c2559-56ca-4ec7-8f55-5e2ad9c58641", "indicator--201860f2-7dc8-4d03-a88b-3d1d6f1cd227", "indicator--c722913f-7d69-4bbd-bb74-477cf1cedb39", "indicator--6dbe7093-897b-469e-8fe0-e5087f7b2b44", "indicator--eb0deaf2-cb08-467f-bbda-c55cfe0229a1", "indicator--29a4b230-198c-4de7-a48d-73f3207e8ac9", "indicator--afcb44db-90f9-4b10-a948-5083f3dc6507", "indicator--4e93cfe7-da95-4da0-8a0c-9556e9a86887", "indicator--71cddc3b-bab3-421d-990b-45229acd4a38", "indicator--99263d59-3524-4cc7-9268-8465124f1acf", "indicator--8b526e13-47fa-4d2d-8440-bf601732159c", "indicator--aa4db960-0406-43a5-a54c-cf0c3e01665a", "indicator--3ebdff6d-927e-4c9c-97f9-2f56c2a1568e", "indicator--6963286b-36b0-48d0-81b0-16c87039a130", "indicator--d93311b6-f012-4508-9c70-436df6b8964c", "indicator--1085a4ab-feb5-421f-9bd5-24c688583bdb", "indicator--563d856d-fe14-4290-9260-605bfe36ffb4", "indicator--cea88c8f-bfb8-4b3b-89d8-83805098ad6b", "indicator--216c02f3-b4fc-4ffd-80bf-0e82fcc6fa0f", "indicator--78d42db3-607e-4006-bc86-23bee7045d98", "indicator--1f945566-12c6-43eb-810a-060d20ec97c6", "indicator--a09c2619-097f-474c-9c0d-66fec222ea95", "indicator--d3e96fb1-0c38-4921-926b-3d52dd2f5749", "indicator--746fb811-f903-4220-a178-1603c4e06aab", "indicator--19cb2a93-7913-4294-b8fe-9b2121dbeb4a", "indicator--1232088c-f161-4d2c-893f-95946936f8a4", "indicator--f00a8fd2-441b-44b5-9ab9-59feb5c98a8b", "indicator--66c2803c-2883-4602-a767-fa54567820cd", "indicator--966576dd-109a-48e1-a808-b987391a2d64", "indicator--3453ee9d-f3d5-4c2f-87a4-28a3a99d9e25", "indicator--1014abb6-a9c0-48b3-b737-589397f750cb", "indicator--c4577ed2-9020-49c2-af8a-4c4e2a61b7e6", "indicator--13272437-840e-49d1-a29d-f48964afd06a", "indicator--70ac9e39-34e0-44cd-b32f-274022fea697", "indicator--a93888e2-a982-4054-acef-a41bf4ac56db", "indicator--e4883120-f95b-49a7-9d9f-23e62ef1a850", "indicator--ec60a434-a1b6-49e6-ac3d-959284ce5820", "indicator--8c0e46ce-ad69-4fab-95ce-ae5e9a31f8b6", "indicator--91d3a44a-b496-4131-8440-d8ba0d17c2e0", "indicator--8d99b59c-7edf-455c-a65e-38289236a39f", "indicator--8a0fd45c-bd77-42d8-a031-f2529e2b48bf", "indicator--e508f088-22cf-4f96-a020-a284f9ffe403", "indicator--a1381522-74d5-4416-aa07-d2b74bd15db7", "indicator--d3059cb1-00d6-4b0a-98f9-32485920bdb2", "indicator--20f9819d-19b6-4a70-a6c5-066aea3717ef", "indicator--c5c300b9-a910-4621-a408-d369590b6648", "indicator--f615e85c-d9c8-46c8-ae69-bca701ef793d", "indicator--fbb185f3-908f-4595-8710-479d1bc974f7", "indicator--de6b033b-b16c-4c6e-964d-80c88d2bd768", "indicator--c71cdb20-f1bd-45b8-9482-745b7eb96e37", "indicator--db3230d6-2a1a-42b8-a36c-000ba704f17c", "indicator--ad75b6d3-a2ff-46d0-99cf-01f1e5b07cec", "indicator--d7c6b9fb-59c6-435b-b074-793aadefa58c", "indicator--adde785f-ae58-48eb-b7f7-a713495462da", "indicator--c723c1df-2176-49af-815d-c06e8b3ebe25", "indicator--40e6352b-05c6-4127-8f44-3ea93cb7ad7a", "indicator--6008f4ff-590e-4d7e-b860-aabf07ca113f", "indicator--135b3903-2ac7-4720-9b49-5df80547da32", "indicator--f42f63bd-90bb-45b4-bdb2-91f1f87d1536", "indicator--a1f4e0f9-63a6-4043-b5bb-7db43c279124", "indicator--5ff94453-32df-4d5e-a823-aba6173dfe90", "indicator--bb01deae-c853-475e-b41b-e32de66bd6a7", "indicator--d5f54335-48fc-4232-b274-8907a18d992b", "indicator--a8cbe746-b257-4303-9095-d134c234bad6", "indicator--c3b293fa-433d-4cc5-a19c-2d94702d906b", "indicator--583ba885-a198-4244-9672-7bc53506e304", "indicator--37446d9d-77e2-4f93-9477-db61d49f0d26", "indicator--825b9570-8f5b-48df-aa2d-0488a547c794", "indicator--fcc71c9c-cb6e-487f-8618-7fe240393042", "indicator--a3ef75e3-bfea-47dc-96a6-62655a5a661a", "indicator--d7f314f6-a53a-493d-a2c6-cc8d77eebe39", "indicator--efa9945c-5d17-4c4e-8c30-39e4b25c5549", "indicator--84116ca4-7235-4145-a546-5f9c39f7c4e2", "indicator--d2e94335-cd64-446d-aa2b-0e72836a9600", "indicator--f6943d8c-bbd1-48f0-b097-c1ce12c30a53", "indicator--97987d4c-9d64-4ca9-8391-f839f800de9a", "indicator--d9f328fe-103b-4eee-bb47-70aae84ff8d0", "indicator--3b5fd2c0-f5af-4535-b552-9aeee29d1775", "indicator--50ae9894-2c2e-4b57-86df-cea9438d7d9e", "indicator--b19eda69-c864-4348-ae04-feceeaf4961c", "indicator--cc36580f-4e41-4310-baef-02b7eedb8c45", "indicator--faf36a80-8e61-453b-91c7-71558cbb6118", "indicator--9122a13b-feae-4100-9ee3-d85363d32a16", "indicator--10a0afe6-5896-465a-8b78-8ac2a04f3e15", "indicator--f17e23d8-5285-4d60-82aa-909b12dfd974", "indicator--149e186a-40c4-4b2a-8e24-724a8dd42df3", "indicator--9510d97b-f690-426b-8cb2-c2d2b924863d", "indicator--6c315d59-c7de-45a5-b1ee-703ef2674867", "indicator--58cd6b51-b2b4-409b-aae4-4bcb8a7e8c17", "indicator--39f186e0-4438-4456-956a-1d3172287bf8", "indicator--6b58b0d3-95b2-499b-a14f-a39342b38b00", "indicator--c50d67d5-8d48-4376-ab2b-3b6f3981f545", "indicator--891adab1-b306-48d7-a362-c4cef5186097", "indicator--649dfe20-01e7-49cb-8995-dbb4491d430f", "indicator--6d005320-243a-44eb-9e9b-d70775bff832", "indicator--a323f941-3830-4413-9737-881ffc79f611", "indicator--0f5be515-6bd4-4895-b50d-d84ec5ef56b7", "indicator--8a0cd3e7-98ac-454c-b429-6cbd7db01fb2", "indicator--c6829a70-e632-435c-afb7-5507b3fedb4c", "indicator--7d341dea-7b91-4fae-970e-c3255f8efa72", "indicator--100e31ae-42ce-462c-9e3a-e7d66051f37e", "indicator--3202a22e-f278-4d3f-bc7b-ee1a71b1cc33", "indicator--71ce0d9d-3dd9-41c7-8ab8-39275494c860", "indicator--daeec3f2-387e-479d-b7d4-09138264a693", "indicator--0440b2cd-1e54-4bd2-a934-a034f5d7de67", "indicator--d97c9591-13f8-4d61-b73c-905ad3669f2d", "indicator--71cea58c-54f5-4dae-ac79-ea2725814043", "indicator--e0e5e230-ef8c-4397-b6d7-37dcc36b279f", "indicator--a40dc30e-6595-48c8-99a3-6886b23356b2", "indicator--39fb24ee-d9a7-461e-b7ec-3d817833ed8a", "indicator--37f58b98-c27c-49f9-a0c4-759d1e44251d", "indicator--d43d2035-0f4a-44f2-9b75-8993b78ee308", "indicator--be5a47d5-2b24-4e7d-9ca7-d12a8903690a", "indicator--dcb3339d-b618-4353-af77-038c43d1e1ee", "indicator--63c710c3-7b13-4013-8dc4-5b3aca57bcea", "indicator--7a56449e-d654-47fa-8003-c576309a2e6b", "indicator--84bf56ed-c534-4deb-b273-0e08ed3a53f5", "indicator--cfe96d33-cf8d-4f73-9371-69b732a40a3d", "indicator--5c0125e0-1096-4eaa-a3d1-55b866214fd8", "indicator--a2b502d5-5079-4d0b-b49d-920e4fdf85b2", "indicator--4333b250-f703-477c-ad6f-6cc62d18619d", "indicator--a0ea5c96-14ff-4d2e-8521-2cf364c197d3", "indicator--eec88ef1-cd18-49fc-8f24-9f9603c5e2f7", "indicator--69c790a7-f177-438f-bb55-0eceb45d73d6", "indicator--a09fd416-189e-470c-9e0c-c5120c2fde33", "indicator--f3c2487f-aa47-444c-a523-59c8c95dce2a", "indicator--85453fae-ac42-4c8c-8b1e-64b7ca26865e", "indicator--fae63b24-848a-4f96-963f-cf794b409cb0", "indicator--6d1e5fe2-73b1-4f22-bbfd-55c1654ed15c", "indicator--a5770437-5177-449e-82f4-1fe891c220fd", "indicator--d990532b-103c-4e5e-aab5-7cf0aaf4ebc6", "indicator--65178575-e540-481c-ada1-e4532812d607", "indicator--152c5abd-c3e3-44ab-bdd9-d43f338e429b", "indicator--a10f90de-97f2-4f83-a570-b2e893f9eacb", "indicator--25bea186-6554-4572-a80f-73e0b81dd97b", "indicator--aaac2105-b68c-4536-ba28-ccf4c618263d", "indicator--ffef09f2-a3ea-447f-bfeb-b8c4a00e6d56", "indicator--ac828bf9-7906-4ac9-a4a7-b7c5b2afe4d2", "indicator--eb10b758-589d-459d-8363-02d5398f814a", "indicator--20d58ef7-4499-47ca-96c6-feb8db38e166", "indicator--479746a1-000e-4131-aa3a-2c1c832748e9", "indicator--66673f6d-7d31-451c-8a8b-006eb1f10f4d", "indicator--13fb01b4-1e24-496e-a187-1b89e4137ab5", "indicator--32ea38ba-4a06-4a11-a534-47592f7ace54", "indicator--7603e35e-59f8-4242-84d9-3bc87cc37aa0", "indicator--fbb48f8f-6ce3-40cf-9dab-9483295e19d1", "indicator--711c79f7-95db-4d80-995d-b6ef5aa1a20a", "indicator--08da0d07-b91c-49fb-9c3d-4c9a646e04e8", "indicator--6ad242d2-e7ac-4372-869e-65c3692361d0", "indicator--fa660c7c-3cbf-4fb0-aec9-1eb4faa36469", "indicator--c242ae7e-0a50-4442-8b00-5b7ee1d493cc", "indicator--07c1a966-7237-4f8d-808d-78b1794b6be9", "indicator--a176aa95-8fee-430e-b5fd-ece7b7776447", "indicator--9306bc9d-4e12-4b74-a173-b03260ff806a", "indicator--3babba64-d7d8-439c-9b06-76ba067373ce", "indicator--322d3a5e-505c-4180-a892-4f191275dd44", "indicator--aa4a79db-1fad-4142-ae37-b9313b6abdfc" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "fr-classif:non-classifiees=\"NON-CLASSIFIEES\"", "cossi:TLP=\"white\"", "cossi:RechercheSourceOuverte=\"Autorisee\"", "cossi:fiabilite=\"Bonne\"", "misp-galaxy:threat-actor=\"FIN11\"", "misp-galaxy:threat-actor=\"TA505\"", "type:OSINT", "osint:lifetime=\"perpetual\"", "osint:certainty=\"50\"" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "x-misp-attribute", "spec_version": "2.1", "id": "x-misp-attribute--8a948ce0-c2c8-4e2a-8c67-73757b48474f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "labels": [ "misp:type=\"comment\"", "misp:category=\"Other\"", "misp:to_ids=\"True\"", "DescriptionTechnique" ], "x_misp_category": "Other", "x_misp_type": "comment", "x_misp_value": "R\u00e9sultats de l'investigation sur l'infrastructure d'attaque de TA505" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--87ca8c58-8696-4752-8b62-34c714be0ec0", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "SDBbot C2 server [2020-11-29:]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '135.181.97.81']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--be9d342e-4921-4e85-afd4-f8201e059fb0", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "SDBbot C2 server", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '158.255.208.148']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--040b18be-531c-4297-bb5b-a69595c36d96", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "SDBbot C2 server", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '158.255.208.168']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e69552e9-3236-4222-9cd3-10b0fddaa6dc", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2019-07-31:2019-07-31]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.112']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b50dda3c-65d6-4ff3-97ef-1ea1e2cdfffc", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "CobaltStrike C2 server potentially linked to TA505 activity [2019-07-17:2019-08-06]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.132']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9e7b230e-24c3-4cab-a4e4-7e4646f0f080", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "CobaltStrike C2 server potentially linked to TA505 activity [2020-09-20:2021-02-04]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.140']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--abb56917-cdb2-4b03-bebe-a6f59ff126ff", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2019-09-23:2019-10-01]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.173']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3b70dc09-21b1-4eb0-a928-cc5111f14d95", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server linked to TA505 activity [2020-03-06:2020-12-20]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.175']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e944d50a-d898-42b4-a2b9-d4d8b2e1753b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2020-03-11:2020-11-13], CobaltStrike C2 server potentially linked to TA505 activity [2020-03-13:2020-11-08]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.183']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a1c721c6-6f26-4145-a402-34c115b7a19b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "CobaltStrike C2 server potentially linked to TA505 activity [2020-11-23:2020-11-26]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.197']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b6267eb6-8a68-418b-bf0e-3eef8c759733", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2020-03-09:2020-05-16]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.199']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--406df6c9-7eef-4e2f-a752-5c1de09e8dc7", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2020-04-12:2020-09-05]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.208']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cf8ea963-4fc6-49f6-b527-fa2369256ed0", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2020-03-10:2020-12-22], CobaltStrike C2 server potentially linked to TA505 activity [2020-10-07:2020-10-07]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.226']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--45825169-fa00-4347-acd9-ce3b0b3373fc", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "CobaltStrike C2 server potentially linked to TA505 activity [2020-05-08:2020-05-08]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.228']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8e7055a2-a143-4ee2-bc02-6395d2f5a5fa", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "CobaltStrike C2 server potentially linked to TA505 activity [2020-08-22:2021-01-31]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.229']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a90b7ffe-659b-46dc-b65b-c04d677325c5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "CobaltStrike C2 server potentially linked to TA505 activity [2020-07-28:2020-08-06]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.231']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--573d2e84-91f0-4146-96c1-5ce580b9aa70", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2020-10-09:2021-01-15]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.232']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--354d0ab3-88c3-479b-8e20-b9aff14d42f8", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2020-11-05:2020-11-27]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.234']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1ffe4154-7123-43c8-9914-c36e5aa076e5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2021-01-06:2021-01-14]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.235']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f9a1b32a-8919-41fe-91c9-51da8900a005", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "CobaltStrike C2 server potentially linked to TA505 activity [2020-08-19:2020-09-10], Metasploit C2 server potentially linked to TA505 activity [2020-03-21:2020-03-21]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.237']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7164c0cf-1fa7-4484-b659-2903679186e3", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server linked to TA505 activity [2020-06-03:2020-12-16]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.238']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4dc60509-682a-44e0-a4fc-3c7461e6dd57", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2020-03-21:2020-12-18]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.241']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--33b81673-0741-4553-99b6-f96ebf796c67", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "CobaltStrike C2 server potentially linked to TA505 activity [2020-10-06:2021-01-09]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.249']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b50afc63-83df-4712-be66-2bebed391e29", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "CobaltStrike C2 server potentially linked to TA505 activity [2020-10-25:2021-01-30]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.121.14.251']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--60514e79-296d-493e-b924-fcd68d2bbf05", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "SDBbot C2 server", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.17.121.188']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--33026849-2e8a-4dbd-8c2b-9b3d84140214", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2019-10-07:2020-02-01]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.13']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ab65bc08-32bf-44a5-8d74-72315fa643ab", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2019-08-14:2019-10-15]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.18']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f89233a1-20f2-4a3f-bc04-c1e90b988cb3", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server linked to TA505 activity [2019-09-11:2020-02-07]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.20']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aeb40c17-e1dd-4fa8-9aa1-9183148ba5b3", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2019-10-04:2019-10-24]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.22']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e431439f-cba2-4ccb-988b-7dddb175502c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server linked to TA505 activity [2019-12-19:2020-02-05]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.25']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1e7256d7-3aff-4b3c-b653-d8c7673fe2c5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2019-08-10:2019-11-03]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.29']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3e177ad5-6b94-4bc8-b772-4061d63d2c75", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server linked to TA505 activity [2019-07-31:2020-02-03]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f2204f52-d094-4f88-b850-ef46031aca37", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2019-09-03:2019-10-30]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.53']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--05c81d51-8984-4898-ae12-f8e9db99ad34", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2019-08-04:2020-01-10]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.54']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--859590e6-313b-4b76-9e2a-a7653be3d90c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server potentially linked to TA505 activity [2020-01-29:2020-02-25]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.57']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cb4ec068-2ce9-41cb-bb5d-441edb9f7958", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Metasploit C2 server linked to TA505 activity [2019-11-13:2020-01-15], CobaltStrike C2 server potentially linked to TA505 activity [2019-12-21:2020-01-23]", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.214.124.64']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b4e69725-e167-4a17-be0f-3e31750abd4f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "SDBbot C2 server", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.38.135.217']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1d90023f-6c6d-4caa-82f2-5f688c3aa6a9", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'alpha-telemetry-microsoft.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ecb2b106-7ecb-4dcd-93e3-897043a7615c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'att-download.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eebfa6e4-0031-4d51-8a5d-5852164e2ebb", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'auxin-box.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--21a67340-19be-4865-891b-9444d4d69e35", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'backup-place.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d654f256-aa41-4b06-bf68-7db5284e0ee5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'bak-home.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--279ef0ba-e00e-48ae-a59c-3eb61d5113ec", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'bak0-store.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--79e1a58b-6406-4d53-9bd6-8f240837114f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'band-switch.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a7e201bb-4a05-4f02-9fc4-839f103e97c3", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'box-cdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a4713845-ac4b-4a78-875b-fdf1650fbbac", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'box-cnd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--70db6701-037a-44b0-9c2f-fa393eecea11", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'box-en-au.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3f51eb81-496f-48a1-b730-e8b3fa06cb92", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'box-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c0072af5-6d80-430d-8b8e-1e4a60ef4132", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'boxfiles-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--319bfce4-1b0b-4256-b551-8146097d251d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'boxrcdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--270b486b-3e52-4199-8e74-c653e900d244", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'cdn-box.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fee0967b-0a9f-4fa6-844b-5f7619cea2b7", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'cdn-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d254c49f-3918-4f2d-a393-abf074d4a59f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:26.000Z", "modified": "2021-02-08T15:06:26.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'cdn-onedrive-live.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bcb8878d-9773-48e8-b993-462e39940727", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'clients-share.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--94c95735-a074-4364-a824-90e67cdcf381", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'clietns-download.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a06f406e-7302-4666-b5b5-a92571a91095", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'cloud-store-cdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0b3e2cc1-f287-47c0-b6f2-bfcfb6a1b033", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'clouds-cdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5eb3340d-b602-40b0-8175-81398b88eafd", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'clouds-doanload-cnd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--44de8360-a6b0-432c-87f4-512971037aaa", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'clouds-share.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b3f1e177-e34d-49f1-a403-dffa7c6fa27e", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'corp-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--45fd1f4b-1f20-4429-a746-d4c2348f64d0", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'corp-storage.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--924f20bd-8154-42c7-88cd-0dd0979bded1", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'data-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c4843f3a-cd59-433c-b2ac-8f1b7c8100e1", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'daumcdnf.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--403af9dc-5477-4d70-adea-fcd2304bac7a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'daumcdnr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4bad8ba3-5178-45a3-894f-3057f10538e8", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'daumcdns.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9890c8b9-aaf7-41a3-a9e7-12b3b096470a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'def-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--980c81f3-e780-4463-9731-cf83d355c25e", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'definite-limits.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--286437b7-a58f-4d9f-8101-c61a0a673b4a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'digitals-space.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--96e25de7-fc29-4f29-a80b-ebb4b173c686", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'direct-share.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--916ab6c2-c568-4efe-9c55-40c08049ecab", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'direct-space.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2915857f-b6b0-44c5-85fd-4a72b0771ec3", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'direct-upt.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5162ae33-78d3-4112-8fbf-34d9d8b9b6b4", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dl-icloud.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--43ceaf6d-6d9e-4f44-a10c-ae650a513595", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dl-sharefile.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ea78b23d-0c6c-4bbd-b1b3-432d7e32c392", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dl-sync.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ada1b5cb-32a4-4b24-a60d-9372e55d1fd0", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'docs-downloading.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--80319433-0eee-47f6-9bf4-fc600d13934b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'download-cdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--327c1ba1-a381-490c-b82b-f78261d88b69", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'download-shares.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f6510191-8364-4e0a-ba79-cc5b98fb01d4", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'downloads-links.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b8649d50-42e2-4da5-a3ba-bdbab35172a5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'drm-google-analtyic.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2c691f11-c9d4-498e-be07-0e368b402711", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'drm-server-booking.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c7a8262c-8769-43ea-b680-9847df435fff", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'drm-server13-login-microsoftonline.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1310e8ee-5470-41f0-b261-25f8ef4b73cb", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropbox-cdnn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--28a1cb04-3bd5-420a-8e93-10e458fdab67", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropbox-cdns.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c0eee752-ad8e-43a5-a5a6-05a203799ed5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropbox-cdnt.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3a7cf6b5-6505-4f06-876e-460234b4b1cd", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropbox-cnd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--049819a6-f515-418f-ae8b-0791e5c54471", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropbox-download-eu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--77e9a166-859d-4c1d-bc9c-83050e512442", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropbox-download.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cb8b17a0-2a6b-43ac-ab2f-f424ae8106b3", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropbox-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9b309ece-8dff-4c12-a2b0-6a542b303ac2", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropbox-er.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c174c903-973c-412d-b0f1-db21420b80ef", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropbox-eu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ba5066f0-9af9-4a0d-b8fc-9a79ee999211", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropbox-sdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dc362b7a-0cd3-48b2-922a-7b3e77d99898", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropboxccdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d1b245ab-8562-41d9-a398-96c2d4f1c19c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropboxrcdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6b1f6594-f757-4b13-8c98-1f4d4f90d481", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropboxscdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5bd69ccc-3aa4-467e-bf46-7a64114a55f2", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dropboxwcdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--491d00be-9d4f-4b56-b547-2ae7b2b5cac4", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'dyn-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--281bb75d-4489-44d4-890f-4bd1c740263e", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'dysoool.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ed326b90-395a-4634-a88f-6b7a2e5f02b4", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'egnytefs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--849e5f07-f9fc-49c0-9cf8-6740ae8af400", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'eu-download.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e7147c71-3418-487b-8689-63b8db0d9575", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'eu-global-online.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e6f2b50b-ba16-473a-b1d7-26b7c0bd8a00", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'eu-global.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1a623117-9834-43be-af23-3fcdc65febe5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'ex-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--949748c2-a635-4260-992b-2e1d94b8f1dc", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'ex-stores.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--87c6dc36-162b-4fc4-a286-dff55b75d7c6", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'facebook-drm-server3.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--34a8f9cf-762c-41ba-b4c1-eac62708dd7f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'fast-bits.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--73054c9d-c3ef-4de7-b339-128849ccc88d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'fast-gl-backups.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1be46a93-b950-48fe-a42f-e2b8d904dc87", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'fasts-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c78dbee1-520d-4e00-8439-261934be3fe5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'file-shares.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b97f726a-2bfa-4736-b27b-17bf9d179724", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'files-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8f666e9a-635d-49be-9e6b-8eaf5696fe1e", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'fileshare-cdns.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ab94efd4-6dba-4b43-8b46-cf4fd60a3e34", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'fileshare-cnd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e38205e6-2b49-463d-af76-52d46f08472f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'fileshare-storage.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9893de46-6972-4e6e-8746-d07cda98bbac", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'filesharess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--877be12a-afb7-463f-935e-15bfa2aeae6c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'filessz.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--38d6f0b3-8486-450b-87da-4dc8ea5b7534", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'first-destin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2fd30988-e13a-4db8-8c8a-63aec004d62e", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'fosdommtoi.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3d320cb1-66d2-4a71-a7c7-a94b4096555c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'general-lcfd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dc01f983-990a-41b0-a2c6-2a9b30852df5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'geo-st-microsoft.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--26171675-e97c-4fd3-8b01-2b88538e71a9", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'get-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6eaef210-9788-4f78-b55e-48bc2c6f2493", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'get-hlinks.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8f289f69-8528-454f-8729-302b1be01a46", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'getlink-service.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7eccc282-19c3-4e3a-9f6a-c99c23d9ec42", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'global-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9a36943e-1c3c-4efb-82e1-300f7f576a84", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'global-logic-stl.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d8f34d4e-4679-401b-8863-4c7f6f74785f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'glr-ltd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4dc9420d-d2a8-46d5-83a2-0e71a28d5600", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'going-tr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6a69044f-eb49-4aa3-8df8-c713f56a27e2", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'google-eu-cdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--487f5f41-1573-4b4e-8b61-08dbc1b93cdf", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'google-us-cdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b71f6526-bc1f-4c62-90cd-19ef086af15d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'googledrive-download.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c06a0e3e-bb24-431f-894d-b9ab90812b6c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'googledrive-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0d9ebc37-2db9-4e8b-a6b1-e4b0cd78da35", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'googledrive-eu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f272b94f-90fa-4271-9cf5-1f34c9b4b14a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'googledrive-gb.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--110ad250-9355-4cfd-890d-aab17f9e4cd8", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'groms-dat.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--705a3929-f729-440c-82c8-4008b45b1978", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'home-storages.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--077b4ce8-8666-4901-ad61-55e4a72c3bd4", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'i-sharecloud.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--27630fb5-2bdf-4e16-b3ba-962a2a79ec4c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'int-download.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2f7df412-29ea-48ed-a612-e986d82a4c66", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'integer-ms-home.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3d7324ff-ae65-4a9d-96fe-bf852e55f78e", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'into-box.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--331c536d-b247-423d-9e31-b7ec3ad65a41", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'jp-microsoft-store.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--204eca70-db1f-4cd1-bc88-6bf76aa8495b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'limo-ones.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ab74549d-9606-4514-b09c-47d84ba60d7c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'live-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b8911d36-92c7-4237-9997-cfa9a3a7335f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'live-msr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7d5be3bb-da30-4d1b-89c5-190952432c2c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'local-download.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--df4d978d-bbc3-4b95-a389-76c6bed52b25", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'long-space.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0af623bf-90f4-415c-b358-dfe11818cda8", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'main-boost.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7444ed8f-5ded-458d-a788-2d638dbce8d7", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'mainten-ferrum.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5d6dd13d-6511-40a1-937e-75bee78d289c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'mays-ltd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1b0c2559-56ca-4ec7-8f55-5e2ad9c58641", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'md-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--201860f2-7dc8-4d03-a88b-3d1d6f1cd227", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'mgrs-service.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c722913f-7d69-4bbd-bb74-477cf1cedb39", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-cnd-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6dbe7093-897b-469e-8fe0-e5087f7b2b44", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-cnd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eb0deaf2-cb08-467f-bbda-c55cfe0229a1", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-debug-098.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--29a4b230-198c-4de7-a48d-73f3207e8ac9", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-home-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--afcb44db-90f9-4b10-a948-5083f3dc6507", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-hub-us.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4e93cfe7-da95-4da0-8a0c-9556e9a86887", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-live-us.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--71cddc3b-bab3-421d-990b-45229acd4a38", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-online-en-us.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--99263d59-3524-4cc7-9268-8465124f1acf", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-sback-server.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8b526e13-47fa-4d2d-8440-bf601732159c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-store-drm-server.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aa4db960-0406-43a5-a54c-cf0c3e01665a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-store-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3ebdff6d-927e-4c9c-97f9-2f56c2a1568e", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'microsoft-ware.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6963286b-36b0-48d0-81b0-16c87039a130", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'mira-store.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d93311b6-f012-4508-9c70-436df6b8964c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'mop-shere.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1085a4ab-feb5-421f-9bd5-24c688583bdb", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'ms-break.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--563d856d-fe14-4290-9260-605bfe36ffb4", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'ms-debug-services.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cea88c8f-bfb8-4b3b-89d8-83805098ad6b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'ms-downloading.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--216c02f3-b4fc-4ffd-80bf-0e82fcc6fa0f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'ms-en-microsoft.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--78d42db3-607e-4006-bc86-23bee7045d98", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'ms-global-store.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1f945566-12c6-43eb-810a-060d20ec97c6", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'ms-home-live.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a09c2619-097f-474c-9c0d-66fec222ea95", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'ms-home-store.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d3e96fb1-0c38-4921-926b-3d52dd2f5749", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'ms-pipes-service.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--746fb811-f903-4220-a178-1603c4e06aab", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'ms-rdt.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--19cb2a93-7913-4294-b8fe-9b2121dbeb4a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'ms-upgrades.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1232088c-f161-4d2c-893f-95946936f8a4", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'mslinks-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f00a8fd2-441b-44b5-9ab9-59feb5c98a8b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'msonebox.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--66c2803c-2883-4602-a767-fa54567820cd", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'music-server11-facebook.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--966576dd-109a-48e1-a808-b987391a2d64", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'music-server17-facebook.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3453ee9d-f3d5-4c2f-87a4-28a3a99d9e25", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'near-back.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1014abb6-a9c0-48b3-b737-589397f750cb", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'near-fast.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c4577ed2-9020-49c2-af8a-4c4e2a61b7e6", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'nellscorp.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--13272437-840e-49d1-a29d-f48964afd06a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'nels-ltd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--70ac9e39-34e0-44cd-b32f-274022fea697", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'news-37876-mshome.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a93888e2-a982-4054-acef-a41bf4ac56db", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'news-389767-mshome.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e4883120-f95b-49a7-9d9f-23e62ef1a850", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'news-server-drm-google.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ec60a434-a1b6-49e6-ac3d-959284ce5820", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'news-server17-yahoo.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8c0e46ce-ad69-4fab-95ce-ae5e9a31f8b6", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'nffsd-corp.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--91d3a44a-b496-4131-8440-d8ba0d17c2e0", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'none-class.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8d99b59c-7edf-455c-a65e-38289236a39f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'office-en-service.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8a0fd45c-bd77-42d8-a031-f2529e2b48bf", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'office-teml-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e508f088-22cf-4f96-a020-a284f9ffe403", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:27.000Z", "modified": "2021-02-08T15:06:27.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'office365-en-gb.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a1381522-74d5-4416-aa07-d2b74bd15db7", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'office365-eu-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d3059cb1-00d6-4b0a-98f9-32485920bdb2", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'office365-update-en-gb.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--20f9819d-19b6-4a70-a6c5-066aea3717ef", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'office365-update-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c5c300b9-a910-4621-a408-d369590b6648", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'office365-update-eu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f615e85c-d9c8-46c8-ae69-bca701ef793d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'office365-us-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fbb185f3-908f-4595-8710-479d1bc974f7", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'one-drive-ms.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--de6b033b-b16c-4c6e-964d-80c88d2bd768", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'one-drive-storage.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c71cdb20-f1bd-45b8-9482-745b7eb96e37", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'one-drives.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--db3230d6-2a1a-42b8-a36c-000ba704f17c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-cdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ad75b6d3-a2ff-46d0-99cf-01f1e5b07cec", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-download-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d7c6b9fb-59c6-435b-b074-793aadefa58c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-download.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--adde785f-ae58-48eb-b7f7-a713495462da", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-en-eu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c723c1df-2176-49af-815d-c06e8b3ebe25", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-en-live.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--40e6352b-05c6-4127-8f44-3ea93cb7ad7a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6008f4ff-590e-4d7e-b860-aabf07ca113f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-eu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--135b3903-2ac7-4720-9b49-5df80547da32", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-fn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f42f63bd-90bb-45b4-bdb2-91f1f87d1536", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-live-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a1f4e0f9-63a6-4043-b5bb-7db43c279124", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-sd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5ff94453-32df-4d5e-a823-aba6173dfe90", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-sdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bb01deae-c853-475e-b41b-e32de66bd6a7", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-sn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d5f54335-48fc-4232-b274-8907a18d992b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrive-us-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a8cbe746-b257-4303-9095-d134c234bad6", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onedrives-en-live.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c3b293fa-433d-4cc5-a19c-2d94702d906b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onehub-cdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--583ba885-a198-4244-9672-7bc53506e304", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onehub-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--37446d9d-77e2-4f93-9477-db61d49f0d26", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'onesdrives.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--825b9570-8f5b-48df-aa2d-0488a547c794", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'online-office365.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fcc71c9c-cb6e-487f-8618-7fe240393042", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'onms-home.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a3ef75e3-bfea-47dc-96a6-62655a5a661a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'own-eu-cloud.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d7f314f6-a53a-493d-a2c6-cc8d77eebe39", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'owncloud-cdn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--efa9945c-5d17-4c4e-8c30-39e4b25c5549", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'personal-dss.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--84116ca4-7235-4145-a546-5f9c39f7c4e2", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'pssd-ltdgroup.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d2e94335-cd64-446d-aa2b-0e72836a9600", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'rapid-stores.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f6943d8c-bbd1-48f0-b097-c1ce12c30a53", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'rdmsom.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--97987d4c-9d64-4ca9-8391-f839f800de9a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'res-backup.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d9f328fe-103b-4eee-bb47-70aae84ff8d0", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'reselling-corp.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3b5fd2c0-f5af-4535-b552-9aeee29d1775", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'river-store.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--50ae9894-2c2e-4b57-86df-cea9438d7d9e", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'rmt-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b19eda69-c864-4348-ae04-feceeaf4961c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 's3-ap-southeast-1-amazonaws.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cc36580f-4e41-4310-baef-02b7eedb8c45", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 's3-ap-southeast-2-amazonaws.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--faf36a80-8e61-453b-91c7-71558cbb6118", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 's77657453-onedrive.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9122a13b-feae-4100-9ee3-d85363d32a16", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 's89065339-onedrive.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--10a0afe6-5896-465a-8b78-8ac2a04f3e15", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'sdff-corp.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f17e23d8-5285-4d60-82aa-909b12dfd974", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'see-back.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--149e186a-40c4-4b2a-8e24-724a8dd42df3", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'selling-group.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9510d97b-f690-426b-8cb2-c2d2b924863d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'share-clouds.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6c315d59-c7de-45a5-b1ee-703ef2674867", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'share-downloading.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--58cd6b51-b2b4-409b-aae4-4bcb8a7e8c17", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'share-stores.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--39f186e0-4438-4456-956a-1d3172287bf8", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'shared-cnd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6b58b0d3-95b2-499b-a14f-a39342b38b00", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'shared-download.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c50d67d5-8d48-4376-ab2b-3b6f3981f545", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'shared-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--891adab1-b306-48d7-a362-c4cef5186097", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'shared-filez.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--649dfe20-01e7-49cb-8995-dbb4491d430f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'sharefile-cnd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6d005320-243a-44eb-9e9b-d70775bff832", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'sharefile-us.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a323f941-3830-4413-9737-881ffc79f611", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'sharefiles-download.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0f5be515-6bd4-4895-b50d-d84ec5ef56b7", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'sharefiles-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8a0cd3e7-98ac-454c-b429-6cbd7db01fb2", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'sharefiles-eu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c6829a70-e632-435c-afb7-5507b3fedb4c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'sharefileszz.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7d341dea-7b91-4fae-970e-c3255f8efa72", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'shares-cdns.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--100e31ae-42ce-462c-9e3a-e7d66051f37e", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'shares-cloud.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3202a22e-f278-4d3f-bc7b-ee1a71b1cc33", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'sharespoint-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--71ce0d9d-3dd9-41c7-8ab8-39275494c860", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'short-share.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--daeec3f2-387e-479d-b7d4-09138264a693", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'shortcut-links.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0440b2cd-1e54-4bd2-a934-a034f5d7de67", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'shr-links.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d97c9591-13f8-4d61-b73c-905ad3669f2d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'siron-del.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--71cea58c-54f5-4dae-ac79-ea2725814043", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'sl-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e0e5e230-ef8c-4397-b6d7-37dcc36b279f", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'stat-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a40dc30e-6595-48c8-99a3-6886b23356b2", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'static-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--39fb24ee-d9a7-461e-b7ec-3d817833ed8a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'static-google-analtyic.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--37f58b98-c27c-49f9-a0c4-759d1e44251d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'store-000846-live.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d43d2035-0f4a-44f2-9b75-8993b78ee308", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'store-003774-live.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--be5a47d5-2b24-4e7d-9ca7-d12a8903690a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'store-downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dcb3339d-b618-4353-af77-038c43d1e1ee", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'store-in-box.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--63c710c3-7b13-4013-8dc4-5b3aca57bcea", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'stt-box.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7a56449e-d654-47fa-8003-c576309a2e6b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'studio-stlsdr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--84bf56ed-c534-4deb-b273-0e08ed3a53f5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'sync-share.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cfe96d33-cf8d-4f73-9371-69b732a40a3d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'syncdownload.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5c0125e0-1096-4eaa-a3d1-55b866214fd8", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'syncdownloading.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a2b502d5-5079-4d0b-b49d-920e4fdf85b2", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'tnrff-home.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4333b250-f703-477c-ad6f-6cc62d18619d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'toppon-studio.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a0ea5c96-14ff-4d2e-8521-2cf364c197d3", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'transff-reddon.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eec88ef1-cd18-49fc-8f24-9f9603c5e2f7", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'tremd-space.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--69c790a7-f177-438f-bb55-0eceb45d73d6", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'update-ms-en-office365.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a09fd416-189e-470c-9e0c-c5120c2fde33", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'update-msoffice365.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f3c2487f-aa47-444c-a523-59c8c95dce2a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'update365-office-ens.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--85453fae-ac42-4c8c-8b1e-64b7ca26865e", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'upgrade-ms-home.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fae63b24-848a-4f96-963f-cf794b409cb0", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'url-space.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6d1e5fe2-73b1-4f22-bbfd-55c1654ed15c", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'us-microsoft-store.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a5770437-5177-449e-82f4-1fe891c220fd", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'usr-telemetry-microsoft.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d990532b-103c-4e5e-aab5-7cf0aaf4ebc6", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'west-dat.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--65178575-e540-481c-ada1-e4532812d607", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-afx-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--152c5abd-c3e3-44ab-bdd9-d43f338e429b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-appstore-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a10f90de-97f2-4f83-a570-b2e893f9eacb", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-avs-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--25bea186-6554-4572-a80f-73e0b81dd97b", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Phishing server", "pattern": "[domain-name:value = 'windows-cnd-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aaac2105-b68c-4536-ba28-ccf4c618263d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-dev-sec.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ffef09f2-a3ea-447f-bfeb-b8c4a00e6d56", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-en-us-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ac828bf9-7906-4ac9-a4a7-b7c5b2afe4d2", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-fsd-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eb10b758-589d-459d-8363-02d5398f814a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-me-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--20d58ef7-4499-47ca-96c6-feb8db38e166", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-msd-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--479746a1-000e-4131-aa3a-2c1c832748e9", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-office365.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--66673f6d-7d31-451c-8a8b-006eb1f10f4d", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-se-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--13fb01b4-1e24-496e-a187-1b89e4137ab5", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-service-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--32ea38ba-4a06-4a11-a534-47592f7ace54", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-service-us.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7603e35e-59f8-4242-84d9-3bc87cc37aa0", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-several-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fbb48f8f-6ce3-40cf-9dab-9483295e19d1", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-sys-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--711c79f7-95db-4d80-995d-b6ef5aa1a20a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-update-02-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--08da0d07-b91c-49fb-9c3d-4c9a646e04e8", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-update-sdbt.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6ad242d2-e7ac-4372-869e-65c3692361d0", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-update-sdfw.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fa660c7c-3cbf-4fb0-aec9-1eb4faa36469", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-update-sys.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c242ae7e-0a50-4442-8b00-5b7ee1d493cc", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-upgrade-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--07c1a966-7237-4f8d-808d-78b1794b6be9", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-wsus-en.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a176aa95-8fee-430e-b5fd-ece7b7776447", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'windows-wsus-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9306bc9d-4e12-4b74-a173-b03260ff806a", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'wire-share.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3babba64-d7d8-439c-9b06-76ba067373ce", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'wpad-home.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--322d3a5e-505c-4180-a892-4f191275dd44", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "Get2 C2 server", "pattern": "[domain-name:value = 'xbox-en-cnd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aa4a79db-1fad-4142-ae37-b9313b6abdfc", "created_by_ref": "identity--56bdf779-46f8-4353-bdf9-2bb95bce2212", "created": "2021-02-08T15:06:28.000Z", "modified": "2021-02-08T15:06:28.000Z", "description": "SDBbot C2 server", "pattern": "[domain-name:value = 'xbox-ms-store-debug.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2021-02-08T15:06:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }