{ "type": "bundle", "id": "bundle--cd8b9093-e319-4719-81b3-04a275b2f048", "objects": [ { "type": "identity", "spec_version": "2.1", "id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "name": "CIRCL", "identity_class": "organization" }, { "type": "report", "spec_version": "2.1", "id": "report--cd8b9093-e319-4719-81b3-04a275b2f048", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "name": "OSINT - Ryuk Ransomware: Extensive Attack Infrastructure Revealed", "published": "2020-10-30T09:10:43Z", "object_refs": [ "indicator--8dfed048-c049-4ca3-8c61-18e849312303", "indicator--b88500ac-0313-4587-a31d-1169f2cb698a", "indicator--165a272e-1ca2-471c-a546-7d280a93c8d8", "indicator--55cdea8b-75a6-4ab0-93dc-d455cb2d5a85", "indicator--f086465e-1c86-4f39-90b2-0f29a3889061", "indicator--b2776b50-8071-4a5b-b2b8-a139a6bcc5ed", "indicator--b115a272-f614-4d78-8db3-4f5993dfb048", "indicator--85aceed2-4f89-486b-870c-1400dee522c1", "indicator--015f2f6f-df45-465b-95d1-928bf070e005", "indicator--602bf525-e5b4-4dc5-a505-94329b5db176", "indicator--02443c02-506b-4958-abd0-daccb7f77ef5", "indicator--a199f61e-5141-47ea-8425-dc0e924d7774", "indicator--f820ed47-f5a5-442e-9848-81df9b3bc31a", "indicator--7e54e76d-8e4c-4e7f-936c-83097ecffad3", "indicator--bdb8d512-4b26-4ea4-a1b2-84731b47df17", "indicator--15f3bc4c-a33a-4cef-b36d-e064ff92a6b3", "indicator--4b82b465-a2f5-4646-beb6-875bc34ec338", "indicator--0aa27621-17cc-414e-9b59-bc6db1b99199", "indicator--15f46a6e-675b-46ef-a3dd-383e253be58b", "indicator--8c5e3e2c-3a04-47e5-aa2d-7352d33420e1", "indicator--11c24aa3-d669-42b5-b6d7-d062392832be", "indicator--c6c924b0-5c08-44d6-aef0-992614080b49", "indicator--b8fe84f9-053c-40aa-8435-1601ae67c504", "indicator--3f74ca97-6061-4964-8a06-14d22e059efe", "indicator--52829006-ac3e-43b6-b6e2-43535645482a", "indicator--e7ebb555-7a77-4f0b-8d44-0b7cfa514a43", "indicator--606abae5-2d9e-41d0-b4c5-eebd578d9c1e", "indicator--5485ef1f-0fb4-432b-8a21-5fef00d02258", "indicator--4b8851f4-ced5-4804-b807-9e0e066350bc", "indicator--795556f3-4f6d-4064-ab59-2f72a50eca6d", "indicator--8b83d295-3da3-4e07-b5b9-b803ab88ac08", "indicator--0bd721f4-1b9a-40b3-ad43-180f45a36d95", "indicator--8d9a797d-2eb4-4a10-8271-936eead18812", "indicator--da1fdbf7-bc84-459a-83f9-4bdc4550ff51", "indicator--fddcdca8-e126-4f6a-ada0-6f38a7ee051a", "indicator--7650875e-7717-4bf7-8f38-47eb8930c14f", "indicator--d06f51f3-1b03-48f7-9d5f-73df56bbfc75", "indicator--681a21c2-28ad-48ff-ab8e-2d1cf815c0fb", "indicator--fa210e30-4f71-46b9-af7d-0b129852b5c7", "indicator--eac77d1c-f26e-428f-b03f-78d93a350784", "indicator--72080da5-bc9b-47b3-8031-9afcc0eeeba4", "indicator--c007fc23-e8cc-4d0c-8a29-0ca57d381d77", "indicator--4344efe7-991e-4604-a520-63d2567a078a", "indicator--5f1013e5-083a-4326-af9c-bb28524d2eeb", "indicator--d6544a02-ef46-4609-b4ef-ee0374d91797", "indicator--975d6a1a-5bee-4809-8870-79217305825d", "indicator--dd0686ad-2784-4f96-82cc-da8564528dd8", "indicator--175bc9fe-05f9-4068-855e-6db13795dcbf", "indicator--9994427a-0fb4-4bed-9bee-5e2f71e7b667", "indicator--73ac4089-6ea4-4f33-8573-86797c5d35d8", "indicator--ffecfa3c-00bf-4bb4-b5ea-5fe1c628c1f5", "indicator--a1e41a23-057b-4eb5-89b6-98f536f79b67", "indicator--0f198735-03ab-4348-bbdf-ff72cedb77b2", "indicator--bbb42dd3-05c7-45fb-8950-e561fa3ab255", "indicator--9a28462d-55c5-4a75-a966-798612124f22", "indicator--4eae81e3-eaaa-4904-926e-1d37ddabcddc", "indicator--f7a3c7e8-a390-4557-b3c9-475656c0bfae", "indicator--42a05067-6199-420e-afa8-e1dfe1746234", "indicator--1ba50b46-2a36-4c76-a90e-4ed70698e904", "indicator--cb6fb378-09ad-4dc4-b6ea-e746b51cb95f", "indicator--f1850f72-bb08-48f6-921d-b3147514be67", "indicator--9add5703-dedb-414c-8973-805eefeaf3ac", "indicator--a37702ca-0505-49ba-9b2a-e49bd3580576", "indicator--ad26464a-7b56-46f2-a2b9-ab10fa2d146b", "indicator--773eeab1-23b9-4237-93ee-68828651f077", "indicator--be110bd7-63b1-4daa-bfa2-cfb1d64de018", "indicator--3993b733-9172-4d58-ba15-594082a437f8", "indicator--39373f2a-bbf4-4cd7-99d7-267d7c213f17", "indicator--63ae4a7d-c2bc-4bdd-92cc-6ef9e90cabbc", "indicator--35e82e18-c868-455a-8010-dbd448cebbb5", "indicator--bdd77e67-4199-4199-a388-f4a328a868ef", "indicator--511b7913-beb5-4d2c-8d39-1c5f700797d5", "indicator--92cbf44e-1374-4f0d-9854-85d5238cbf43", "indicator--36818da6-d744-4079-88a4-849896fca8e7", "indicator--1cbc00bf-ec64-4444-9420-c7ae09525e69", "indicator--aa9a22d1-b0b8-41cf-962f-711ce5619da7", "indicator--369e8d63-60fa-4323-a401-336435f1754e", "indicator--f1a33675-c93c-45f6-a07c-4ddcf0582e0b", "indicator--4dd3e70c-38bd-4a61-a00f-3c971d4e158b", "indicator--290a87ac-c4a5-44ed-af8c-cc850a488d2c", "indicator--cefbdf5f-3879-4529-b8e1-6e2cd25da0a1", "indicator--83d0c686-5335-4552-bf94-d9a70ed54ff0", "indicator--032d3e2e-0f00-4a9c-aad5-d6412ffb9210", "indicator--6dbdc417-87e9-49eb-92e3-ee5bbfe52575", "indicator--f4374331-ed4e-436b-8a04-97f22c9dcca0", "indicator--07f1e4da-457e-4213-976b-e3a8f410b2cf", "indicator--68593fe6-0a49-4f73-83ba-97bbfd5caff1", "indicator--88061115-36e4-4c93-9339-924593946e2b", "indicator--d57cf63c-4fd6-4b01-b9f3-b590e7a619fd", "indicator--adbfff19-7a7b-4685-95e3-8b0a848e130a", "indicator--f31a9872-23e9-4e1a-9970-2cf7fcc74ad0", "indicator--1579a174-dee9-4bfc-88ca-71cec352fe12", "indicator--2df701d9-7887-4db5-888a-e023ed683f24", "indicator--256321b4-eb04-4efa-a496-df6fbd82589c", "indicator--bacaa3a7-2d51-45bf-b9c2-a9ed18bee217", "indicator--fc3d7250-dbd4-4167-bac8-190931fe2412", "indicator--7a90fefc-2491-4a36-b24c-5194b886d57a", "indicator--b7b8f26d-b2eb-4c82-b56f-928b76b528b5", "indicator--bd9960f4-8621-4c55-8e96-2cb9501a12bc", "indicator--927fb907-9d4a-4e40-8865-e6a6d1e0609e", "indicator--d6b84255-5094-47f1-b00c-7f96e74b31a5", "indicator--30ee0742-9861-43bc-95d2-74e2c73736ed", "indicator--0aeb53e8-43e7-4d86-9d8f-c24eabdd20b8", "indicator--a10e8c06-b76e-499d-9c4f-96350482590d", "indicator--a351cd4c-a1c2-4485-aad5-d1f1f6fe4c1c", "indicator--3dbf2098-d724-4816-8b53-9595dacf5bcf", "indicator--e0e38055-b973-4daf-ba07-5d2132ee036c", "indicator--410552aa-12e6-4b34-808c-8a15eaeeaaa4", "indicator--2dffd5d0-95a9-4167-a20f-efbce37cd813", "indicator--e668cb26-80fa-476f-9b95-dccc8f157733", "indicator--36faefa9-2de7-4c9c-ad3a-4d23a2414bd1", "indicator--ebb228ec-865e-4a14-94cd-1d74ae55532b", "indicator--ea6cab36-4618-4308-9f76-bc9fd5d6c545", "indicator--98ad36bb-19fd-4fb4-b15c-7ae2211a91c7", "indicator--f4090866-08a5-4340-8573-42cf1b8eb8ba", "indicator--72877c2d-4103-438e-824c-157865180902", "indicator--3304e7de-d1da-4dd7-a9a1-979a7c7e053e", "indicator--0d2be2f7-4e5b-4396-b2d0-dd9676b3e0f5", "indicator--f53772f6-4e4b-4f4d-9b9d-a3886377993f", "indicator--baa84abe-4146-4f4f-986a-3b4c2faa592c", "indicator--9da3863e-53c5-45e2-b5e8-8f0d0f2e0c0d", "indicator--576076c6-f558-427f-871c-1d5e9d4020ac", "indicator--af6a0a9f-5403-4a8b-9de0-a26b300de9b2", "indicator--de48181e-908e-4d42-8445-2a2dfa37baf6", "indicator--a6e460ab-064c-4099-8fa8-ff496465126b", "indicator--5ead3dda-2e81-46fa-8eec-56865a7e61ac", "indicator--83b1fe49-47af-4705-9362-ca671564c57e", "indicator--547a2b4a-1eb2-4fd1-a357-f0d2d9459c53", "indicator--f258f723-fa2b-489e-97ff-ab7653b15e51", "indicator--f389df0e-5d92-4e07-8ebe-42dbe36efe9c", "indicator--47b240f5-3693-495c-a208-93b7cd2a4b76", "indicator--ff964ad0-0b8c-4ebd-8aad-2fcc1fb74c9f", "indicator--aa3ccdc6-7443-45d0-b57a-3039e0a41849", "indicator--b86c3c84-4d71-48a2-9bb7-e563a6d0e02a", "indicator--b7889f44-e9cf-478b-8062-7eaf815965d0", "indicator--9f4f70d9-f493-4571-b959-350a5050c1c0", "indicator--a5b30b0d-b1aa-4c56-ae8e-854032be31e7", "indicator--3e402d85-6649-4da8-a2dd-0d54392fc5f1", "indicator--5e8eeda8-8f3d-4abf-9444-25991d122df7", "indicator--29e3bf99-346a-4f40-a106-7ab26fbf1b14", "indicator--cbf06367-9ff3-401e-ab0a-eb6346be4eaf", "indicator--6b94de3f-e060-48b8-b8ba-2fe9531f469a", "indicator--37894cf8-9159-4928-a53b-950949ac7b53", "indicator--be60ff22-b0f8-49a8-9486-8a7f7a8e6e3c", "indicator--40d81876-ef8d-474e-b1b1-6398ab83a431", "indicator--1e4e6cbc-8d53-443b-9b74-f3033a036693", "indicator--3f4de579-e03b-40c6-b4f8-c309c08ed0c0", "indicator--28b771d4-b6e2-4dbf-8418-aa6b2706a8dc", "indicator--c5da1e0d-1fcb-4247-b696-0a428276af4f", "indicator--f5de0613-fc28-4f6d-b025-2de50ceabd60", "indicator--7a8cb9ee-dd34-417c-8c8d-bf5684f297b4", "indicator--f03331c7-48fe-4f1b-a89a-d5fc4d80af00", "indicator--3df4a1e1-82ea-41da-92f5-bf2a0bbd3fab", "indicator--ecf423bc-426c-422e-a9bc-42cdc56a2110", "indicator--3c55a5b2-fca8-4af7-82fc-58413a5ca35f", "indicator--c4cce24e-07c9-4b05-94a1-e2c053167ece", "indicator--fa6be0dc-10ba-42ca-acca-6d51a68367d9", "indicator--9e6684e7-a420-40d1-a192-e5b179fd4214", "indicator--ca3275a0-10bf-4eb1-a087-973ef0b94bcb", "indicator--fac56ded-07f7-4090-903d-d70af2a53246", "indicator--39081399-833c-432d-853c-a3090d8d4dc2", "indicator--cc39f74b-3b97-43b3-a98a-0c076d64f7a1", "indicator--e3c72c6c-c1ed-4531-997a-7fc1f8b83ddf", "indicator--8aa3b76c-83b1-4da6-bad3-364c1e2319c7", "indicator--adab092e-dd01-499d-b58e-e42ceb7d60d2", "indicator--dba8d556-e4d2-410a-a6cf-586eae184fe7", "indicator--91633569-0baf-4a30-bb64-358c82f86730", "indicator--e1414f2b-a6de-417c-b9e3-b9027af50e88", "indicator--f0321d25-371a-4104-9d3a-486bd8864023", "indicator--2dce37d3-2e3c-406a-9ab5-d84d4c3d4428", "indicator--29035d3f-d8f0-4581-86c9-e83357b64078", "indicator--1f498b54-d70c-42b4-a6d6-dbc378cb4e05", "indicator--943e1000-b7ba-4460-918d-f701357684c3", "indicator--2c39abc9-6e7a-47c7-b8b3-d887fe1e7116", "indicator--8b62d131-8b8e-46ef-9bb3-d469937aa372", "indicator--ae128ae7-0822-4733-b51b-bdbc7e036398", "indicator--1c99be5c-a7dd-434f-8590-e698af8df024", "indicator--6cd822f2-21fb-404c-8f77-04b10bc00229", "indicator--55b4a0ff-26d0-44ef-a53a-193fbed78f8a", "indicator--483db1e7-349e-4a9b-b46d-140eea2b6ee5", "indicator--9fad4bd9-0fd9-4af4-b2c7-646d8dc51df6", "indicator--51a26adf-fbe4-4f71-9aae-02908402ca8e", "indicator--124f9ccf-6639-45f7-8b61-129f4e36465f", "indicator--1282af98-c3c5-45fd-81ab-af3c8a779880", "indicator--1a17ec2f-d2de-4bf9-baa1-428a0108c195", "indicator--6fbeee56-250c-45cb-91df-edf160abe828", "indicator--c3b5e848-4ac9-4cec-87b9-6c452d732ad3", "indicator--67b7dec0-893f-4204-834e-ef9d0230d45b", "indicator--0fa39974-e9f6-464e-b65a-e9952b710c6a", "indicator--6e0bfab4-696e-4d35-a448-ac472c0d48fd", "indicator--075a4cc8-c45c-455f-8ce0-0626cc2ca2b8", "indicator--e83931df-921b-43b9-ab82-e6f5711aa8e4", "indicator--80b58a77-a699-4018-b0f6-aa319287d841", "indicator--60bdd54e-25a8-4525-b766-3bc7890724bd", "indicator--8e09d384-12dd-45a7-83ea-5a5323538849", "indicator--68374fd6-d4f3-48b8-8940-9541e72dcfa7", "indicator--aef6e6a4-b46c-4052-a332-7111b1790071", "indicator--5fefac5b-1a26-4768-926b-fd7d6acd21d0", "indicator--04706cd7-5cc2-4aec-b58f-e1175b264a10", "indicator--e5f6efa7-1ed6-4f27-ae43-0d80cea155d1", "indicator--65dea4f8-3d75-4f9b-a9b8-2f700f729c2c", "indicator--afa03e80-3c53-43ee-93c3-60403b7e9cb5", "indicator--48e5002a-8537-4fe5-a2c5-5ae8a1199351", "indicator--8b15f06d-d26b-4894-9c2b-2d37a00ca135", "indicator--1fe74af2-21ce-4178-950b-d1b7f1f6465e", "indicator--1242cd21-1499-4019-aa19-23514930741d", "indicator--e073bfb0-a049-4ea3-8e9e-e50ce5410dce", "indicator--3e48c676-87c3-4652-9c72-0600ac303b24", "indicator--5feae022-0583-4ed6-bca5-4cd8970fad14", "indicator--665179fb-5237-4996-8d56-1fc35091923f", "indicator--1b230e00-45b1-43e5-9d42-53055806a644", "indicator--4e0a416a-50a2-41a2-adb3-42e713489b8f", "indicator--1d5aa17a-e809-49c3-b633-951c90003a9f", "indicator--05d632a7-b1d2-4685-b416-1778613cfba5", "indicator--473fa15f-360f-43ae-bd6a-9c31b49c8e68", "indicator--3645c172-c292-4368-9643-6b252cee1257", "indicator--d21048f9-2e2c-444e-aafd-473c46b26ec4", "indicator--4af5d025-269b-4298-a13d-00588707a71d", "indicator--f4f0bd51-d065-4cd6-aaf4-8bd1b82e7ce5", "indicator--1ba8521f-0e89-46d8-a991-3f75fd0e015d", "indicator--f075191a-e863-43d8-9bb2-f1f640422f06", "indicator--81c12345-d963-4c76-8987-9b9fd296a309", "indicator--a534ac2b-7ddf-4639-8648-bc3dba854d72", "indicator--efa2a49d-bef6-462d-b481-fbc88edc05af", "indicator--28dfe41e-37d7-4ecc-b7ea-be2e0c72411c", "indicator--f334e275-65ec-4c04-b537-e53379fef535", "indicator--61988f14-72cb-49d5-b71f-57a460e9aa7e", "indicator--04145b55-019d-4d6f-afe5-925b37158fcb", "indicator--70e5fbb9-9818-47ba-b256-f3f38e4170c0", "indicator--ed59cb9b-0c69-4481-8285-3071d8cc0b25", "indicator--d9a80c4e-d479-4134-941c-41b47a8d805e", "indicator--23671ff8-f711-448c-9a22-d0ee4c53510b", "indicator--67db0811-0a9f-4b29-8207-6c2437d5d5e6", "indicator--d26eef13-27ab-4dd1-975d-77cdf75592c6", "indicator--5be3bcf0-03c2-4e13-8934-2e441ee4cb51", "indicator--e873c894-bdf3-4f15-badc-df0fe552d37c", "indicator--bd9b2dd8-8723-4f38-acc5-b03db726c673", "indicator--0053eef9-d437-4b9e-b834-e28ed2f804d5", "indicator--883c34b2-e7c4-477d-941c-1a1115f6bb71", "indicator--f2a055dd-2a84-4d95-99cd-eef573fa5134", "indicator--d1de6e94-d388-492e-8f90-8e1168fdeafa", "indicator--d26d6450-4f1f-48da-a8dc-0cb5cc66339b", "indicator--f1e9646c-5240-402c-a28f-4266c48dd6e7", "indicator--01af9203-2a60-4cb8-b72b-905e0a3b5ee5", "indicator--d9e61e6a-0f25-4e4d-b2f8-329e1037aa49", "indicator--e63f987b-4248-4814-8e68-6667e1d43cef", "indicator--8575a3b7-823b-430b-87b1-1ccdd78d0f3d", "indicator--2639130e-2748-4eb6-8bec-f45b86cb6470", "indicator--8e21e7da-790d-424a-8afb-609653b003d1", "indicator--5e9c8341-24e1-4522-95b4-87f379ae457e", "indicator--ba27dc70-f8c0-4999-8a43-5cadec6411a3", "indicator--2c8d0b84-8cd7-49da-a48b-c6d6da430eaa", "indicator--fd800e1f-eb59-4bfc-8337-d9e72a6cdfef", "indicator--08489cc5-6d5c-4c9b-9a2f-14750957a95d", "indicator--f906b453-4d6d-4706-a046-4cc3b954ba47", "indicator--b5ee1de0-94a4-4fdb-bb78-a9bc6a14c890", "indicator--aecbbbd4-1257-4067-8dc5-8be4136281d9", "indicator--8724a1aa-943b-40ff-86b9-4ca5c7d7a1ec", "indicator--f181f1d9-fff3-4688-b6e4-8d84db72558a", "indicator--f3422730-966d-4129-9a32-de5fe08c2e37", "indicator--ad412593-3a56-459a-953a-344bc0426abc", "indicator--b382511d-15c8-478b-9d6f-ad7d8296a8c3", "indicator--f29c1079-29b7-4381-ab49-5b0fa4563fe2", "indicator--502531c8-7dbe-42d9-bcf1-14b8cd98d67f", "indicator--ecdeed69-b119-4f1a-904c-68c885c6ccec", "indicator--8fadb0d4-9a3a-4f41-840e-2166080c086f", "indicator--c7ca6976-2d6e-457e-8d0d-93804111cf71", "indicator--cda14ca5-af0e-440c-b5ba-77fc94982e69", "indicator--af10b7c7-431d-4c39-92fd-5fa9ec897faf", "indicator--36b3c11d-4825-498b-87db-816b2400ca3d", "indicator--7b237f58-b13c-4a9c-97be-e35ffa69881e", "indicator--f5e4adc9-2cf9-44b1-ada4-3a6dc0b954c8", "indicator--35b6feb7-d983-48cc-83e1-ff4ea7169d71", "indicator--90e7b7d6-2fc5-447e-a87e-08bba3918f85", "indicator--05035135-ea33-42b2-bb12-ea174b206403", "indicator--3ab2f9cd-1f4c-4fbe-8f0d-c7e08c350f09", "indicator--29dbfcb1-a550-4a8b-b48b-705550774e76", "indicator--5ea3bc25-b6f4-4260-8f28-c82a32d3a2a0", "indicator--40c3a2b4-8680-4efe-857a-528de382814f", "indicator--16532aa5-331c-4f39-a6cf-637854d434c7", "indicator--7336f89a-8705-42ce-837f-1155c9d7b44f", "indicator--9e0497e7-3d23-4c21-a0ce-dbfec579dbe9", "indicator--eca175c7-477b-40cc-87d0-45da6e6fcaaf", "indicator--d65ee8a5-1728-4d91-a01a-cdda8bf91f23", "indicator--65a2bdc2-3c35-4424-a876-bdd00cd8c93f", "indicator--58200074-00f6-4fbf-a5ba-f6fb9dc6a92c", "indicator--f7d7cc8b-f8de-4624-9b07-d21cf7259079", "indicator--31d40fd7-6ce6-4e58-8f4a-76ec3c35b02e", "indicator--0a68d01e-2dd8-4440-9cc1-9aa6c50ad6bc", "indicator--babedccb-a76d-4a03-886f-6e60a2cacb5e", "indicator--329bc61c-e575-48e9-b583-07e369f29f58", "indicator--f99d45ed-6b8c-4733-afea-005c560c7bff", "indicator--c3babb5b-b413-4b25-bb85-f0377d423db7", "indicator--09d6eaa4-1888-43f8-896f-3bec781e0541", "indicator--6e523ad4-0b68-463d-ade4-82b29aad2e88", "indicator--7a10f783-320a-453a-871d-4d88c8111daa", "indicator--0ba646f0-02cb-4633-81e6-410b2696624a", "indicator--bec4b36a-3ce1-49fe-b4bc-b97124cca47e", "indicator--a2715236-1d52-4f3a-8e36-73806b779fed", "indicator--f06745cf-a0b5-48a0-8d96-878a015599f0", "indicator--04c2c7ca-30af-4e03-9a5a-8dbe248668d0", "indicator--86c5bff7-477e-4da9-b4a1-a1d44d1f81ca", "indicator--4847ec30-4f53-4b19-8408-44e816491a43", "indicator--d96b9837-842b-46bf-aa96-86a51e47cdca", "indicator--343c0c05-315d-4d1c-9dae-788108dea0ad", "indicator--4075c448-8392-4ecf-b17f-d002868ae0d5", "indicator--7762bc38-a6bf-457b-97a8-0a5863b3a01f", "indicator--97c21d86-a8a9-46af-bda2-5a3afed3aa39", "indicator--c4ccc306-740e-45b2-beca-25249a9db638", "indicator--15cf26ab-c2c7-48e5-9ca7-fc5e08e288a4", "indicator--4fd03574-8a04-41ef-90fa-08d7c33be726", "indicator--44dde33b-8a63-45a9-9752-7757b7e161d0", "indicator--a6fb75da-98ea-4f63-9edc-5ef7a58ce5e6", "indicator--bfb49304-bab5-465a-90f8-18c395566085", "indicator--7422a969-383b-426d-9bf4-25aaef2ade9a", "indicator--b386587f-020f-4444-bd69-5c382052e43d", "indicator--aae03945-d37f-492f-843b-a52ed9e8b82a", "indicator--7088652f-541a-4609-9d6c-c65f6f31c066", "indicator--1953f225-df30-4b24-a9a2-917466edfe61", "indicator--93e4ce38-97e0-4dab-9c9c-01e906630a4e", "indicator--252296d6-0a35-44d2-9d9a-a4695900085b", "indicator--82948f4c-8f24-477d-9454-26c9e09171d1", "indicator--d3fce3d8-5668-4d98-ad54-84c4cad0e4e4", "indicator--e49699df-ceab-4402-bae3-d847f798e146", "indicator--b3bf090b-987d-4fd8-aad9-4ac8a3bd07ae", "indicator--ed5a5d98-b84d-4956-9bdf-0fe7a1942317", "indicator--46127a4b-0f87-4dd3-b21d-9608b2132a2f", "indicator--8579e91a-49f4-4d30-9470-61d96287dbd2", "indicator--20d561a8-6174-40cc-978f-4559b59a3af0", "indicator--8d0540de-2449-40b5-b7a4-5f82a4d030c1", "indicator--43fe4f9d-21a2-4eab-982c-35063e1cdc4a", "indicator--852c0b21-020e-4af6-bf9b-144cc8ff0169", "indicator--2bb5b698-3e83-4534-bfb9-712be0f79827", "indicator--7743d3da-4b1f-4882-b0ce-b420483fdf8b", "indicator--a1ea2887-8dd1-402e-a26f-6d01a1837425", "indicator--2472f179-de92-4d29-8689-ef542330adf2", "indicator--fd3b068e-af7e-45d5-995b-ec9320c592c1", "indicator--693e5fbc-a928-4762-8d89-b9b40a6ffb33", "indicator--535b0e96-ea61-4de7-8bd1-c557d7760ea2", "indicator--1d85242b-440e-444f-9d27-5d6fff1963d1", "indicator--4538b840-019d-421e-a878-5e378dbb7323", "indicator--54ffbf0d-19a4-4378-8801-68e334507788", "indicator--39246bc1-7625-4e67-90ab-41e05ad35a9a", "indicator--89d7acf0-153b-474e-b5a4-7d20e1ec1733", "indicator--70c3808b-2d68-42c9-af29-b67479bf7611", "indicator--32e20e50-8cee-4ee7-bf17-949759ed055a", "indicator--23922432-7036-4909-980a-1ebc15d911e1", "indicator--9d209746-ece9-490e-9013-da712c8079fb", "indicator--caa580c5-ea95-45d6-9484-b6c376d55f5e", "indicator--ddd5c3ba-9730-419e-8c76-37954ed1f651", "indicator--482f52ae-a552-48e7-9212-11fe105a6e70", "indicator--951c4df3-7bb0-46a3-90f5-eba0c70ac8ef", "indicator--cf1b1e74-0acd-408d-bc17-6e219c111257", "indicator--30d20b4b-7956-4dc8-b356-7fd4f63c19c7", "indicator--f7d43580-94b9-4d46-92d4-d9d27258db44", "indicator--bd77dc73-7750-42e6-975b-e57f102b1813", "indicator--dc6d1e87-c191-4790-8bcc-6e79c8d28136", "indicator--88214a6d-8d44-4fad-a703-9ac162236468", "indicator--5c73b189-38d8-428e-b44f-1f7b6e7a94dd", "indicator--0b0aef8e-be9b-4e91-b01a-4781b90595be", "indicator--af647f92-c1b6-4bd7-a889-b1c8a58ce3d2", "indicator--0e6b8f7a-52b2-4c3e-b4f2-ee72dc221c2c", "indicator--aaeb8272-c8a0-484a-a682-628ed3e6e184", "indicator--3450be9f-3b1d-4853-b373-a39f8f5c2646", "indicator--ced1e7c9-9294-40e6-be76-20bd66e8113b", "indicator--c7486bc1-4bf8-4168-a964-d94bd466dcd0", "indicator--dacac55d-811e-49af-8158-cb422ec21ba0", "indicator--72d4f1ef-d0e6-434b-8b56-94bb0155f71e", "indicator--f8acb3a8-5e24-4c74-af2c-690771852af6", "indicator--70f2728e-e1ad-4b7e-b8de-bc894c225e82", "indicator--7fb187f8-211e-422a-9f22-e36fac615ee7", "indicator--0136717b-1b52-4d0d-a3fd-8202c5c9c2bb", "indicator--dfa4412d-3a95-4a70-8289-22900b8bcefc", "indicator--e4846c02-5493-44f4-b838-bbe04895dfb7", "indicator--f7d04dbf-68d3-4cdd-925e-bf4502a8bce8", "indicator--31f8c640-d970-4631-a0de-9287266d3f0c", "indicator--b173d53c-c6c4-48f3-b43c-af4724505ab9", "indicator--a02e4db9-2fa3-4f52-a2c5-964470edbefe", "indicator--474fd1a4-a43a-4f3c-bfa5-b6ab250f82b7", "indicator--7be68d76-176e-4fdb-b16c-788138ebcc26", "indicator--fd4fd1ec-d805-41de-a500-944ddbceae71", "indicator--9c69988d-3594-4649-9307-4337027e981f", "indicator--d9dc2a7b-6b8a-4cc1-8dde-a98a1619c1f3", "indicator--eda1aeee-fce4-4d94-864c-9f6f73a867aa", "indicator--2a88fdac-c56d-4dd8-961f-5e5766b3186d", "indicator--1d6011c4-22c8-4090-b0ab-6d8cb577c849", "indicator--8ae15166-cbb5-45e9-baf2-fb330d70bc81", "indicator--ec7cc9b8-2fd0-48be-b9df-3c32c410b365", "indicator--9ccbe931-cdef-4eca-8110-aa6d201ccc77", "indicator--32b05abe-3c7a-44ee-903d-6a520d5efafa", "indicator--c2175d5f-a057-4d36-b362-61f24daabb7a", "indicator--8e62d86c-5c72-47b5-bb4f-2f8d039c8719", "indicator--d861c76e-222f-4de2-839c-4f4340ea0e39", "indicator--6250a9d3-582a-41f2-b50f-b10150c48ccf", "indicator--b3c9ecaf-a53f-4875-b285-0d96ab9626b2", "indicator--f7559952-870e-455c-bf16-fdd0522427b0", "indicator--a4c5a2ee-84d3-4cc6-bfb2-21ddf0849f35", "indicator--d2ee928c-1da5-4ff3-aab7-d3fcdc1a4f85", "indicator--d77691bc-dce8-4838-a94b-4d7b9d9b6e73", "indicator--5df066fe-9159-410c-bcf7-ad25baf2ea73", "indicator--00a7c285-2067-4d9e-b698-329377a0d653", "indicator--d3429c37-781a-4dd3-89db-f643e16489e8", "indicator--284f938e-10b0-4240-a855-050ab5c52ef3", "indicator--f4330632-7dc1-47b3-850a-a8230a86b79e", "indicator--54148e00-a523-4c0c-9803-2c8b857a17b1", "indicator--4ea20129-4aa2-47b3-9228-ff229cfa993e", "indicator--9d23c075-1251-482d-baee-85ada35c9b5b", "indicator--88bf3280-ee48-435c-9cdd-9efd3d675bc7", "indicator--5d85bacb-f0f4-4ce5-9264-2e8a6eee1652", "indicator--91e42527-8643-4a15-b6fa-50176ab7c9b0", "indicator--55ccd03e-9c13-4a2c-a5b4-48d6a55a9b95", "indicator--40b184cb-7663-42aa-b78a-ec121555013c", "indicator--46d7588f-2dcb-45c2-a279-4bd75b3c3b0b", "indicator--fb1ce8f8-9909-41be-9584-79064e070fed", "indicator--a04bc8a0-b3c3-4612-9288-58e81c4d8355", "indicator--101aecf3-ab05-4c67-8bcd-e681c2c0c634", "indicator--4b747d3a-ee11-4e28-b2e1-94ed973509be", "indicator--82d015f4-a21d-443b-a609-ef83d2e25ccd", "indicator--f32158c7-3fc8-49f0-a962-85c16895dbb4", "indicator--4c647ee1-64b9-442e-a77f-2d8cf9786b26", "indicator--e7bcde05-21bf-4d3f-b14a-dfb84c291084", "indicator--6bea282a-54c2-40cf-a2f9-5d9c2b22d7dd", "indicator--afd6912b-3484-4ea9-a6a9-4fdf28cb3158", "indicator--ec234240-c7a9-4535-b646-8e074dbbb800", "indicator--d5eb7209-d293-45a5-998d-8cac1951174f", "indicator--7c311194-bcbb-44ff-9c06-a1425545fa15", "indicator--7a4d70d1-469e-4dd1-b6e5-e45a072ccc63", "indicator--e58c0648-bb27-419c-9976-4d9576de1cba", "indicator--ae834617-91b5-48ad-a036-c72589068944", "indicator--e1d62bf4-7fd6-4531-a13c-9496aee31df2", "indicator--d5369813-8387-489d-9f27-40f633a90eb1", "indicator--6d594cc2-a1d0-4e94-bbf9-a8f15124e963", "indicator--1e2a86b5-7ebf-464f-8986-07d99191addd", "indicator--9e90999e-1746-45b4-899c-0ed91f249bfb", "indicator--3a7a1d8e-3ee1-4677-92b7-2b168e312a0e", "indicator--7b41ca1b-a163-416f-b3af-deabeb4ef07f", "indicator--753b5b14-6609-44c6-9c26-372ebb6e9376", "indicator--1120d4a3-73bc-4db8-8ef4-5831277385cf", "indicator--12e82dfd-c1bb-4315-b968-101436fdbc89", "indicator--dfba97d8-dc36-481c-8081-8f5f9b26dd70", "indicator--347b6568-c826-4ad0-a3ea-f22bdf0d1775", "indicator--c6a7f0d3-db60-4e60-bdfc-8e162d90a1d7", "indicator--73506f1c-cde9-410d-98fe-c1f81e63b87a", "indicator--6046b486-39f8-4939-b8b8-d517a0657d12", "indicator--dce27e05-9eee-4051-b1d8-2c974d9a5c3f", "indicator--3b68eabe-c8a2-43cb-a059-481a8ee6da69", "indicator--1d869b9c-e2bc-4b85-87f0-32cafa6d9d6b", "indicator--034b84f4-18c4-44fa-bbb4-45a4a0966abc", "indicator--89910d17-ab37-4ef6-9c4f-e6fa03021629", "indicator--c95f0b95-b2ca-4902-ab2c-006b119f164e", "indicator--d9b3fcaa-add9-4064-b118-8c15d1d4f544", "indicator--61ff0baf-0c19-46b9-8d5c-6adb34f9bed1", "indicator--2f5ea08b-29b0-4baf-b083-ea89f6a72177", "indicator--1b7998b7-3724-4ced-93ad-2bf684b74c24", "indicator--d08043a0-b2de-4c11-b987-3f29d653e78a", "indicator--7a5bd8b1-8a48-4728-8913-cca0bb8c1c37", "indicator--aad0927c-115d-4424-8220-384edf90118c", "indicator--849f7b63-d899-43d2-a0a3-a650a2b62ebe", "indicator--450a8cb8-3805-4af9-9c38-ca28d68bd1df", "indicator--640fb10a-5786-4eaa-9954-97a042e711b5", "indicator--def6728a-b08f-4fe6-bbb9-ccde0ee75b8a", "indicator--10a44540-2ac2-454f-b97d-fda1e0607792", "indicator--a765235f-b566-42eb-ae29-be94bb9ad842", "indicator--27574dbf-1302-49f6-9360-0785840d4a4b", "indicator--62ec0c04-da00-4dc1-85aa-888b8866ec16", "indicator--81c28e98-9c62-4ae9-9909-37d64728c28a", "indicator--e47cdf96-2f8e-4c55-acf0-5e98f1dc51db", "indicator--c494b3f4-b64b-462b-bc83-208415420168", "indicator--dee40d99-b6ad-4da8-a40a-5b7fcad243bf", "indicator--24670c34-ba21-4807-8a90-ed5ae82a1e53", "indicator--8a8644a6-b8ba-4147-9575-b8cee0b27e50", "indicator--4f58a54a-70bd-4909-a347-31acb2d5706d", "indicator--c028bd4d-69ca-48a7-a6d8-83e9f14dde0f", "indicator--c9cee02c-3e29-4515-916a-3f31bf58126c", "indicator--0b411a58-444d-40fd-aad5-73c145cecedd", "indicator--922434aa-d603-4d22-b1dc-a39128d350e2", "indicator--409f5ab8-7060-4b72-a10b-0b0be19048c5", "indicator--16b6045f-ca74-4d51-9682-5d0c85c997e5", "indicator--94ba7e87-0654-4786-901e-4b5050d008a4", "indicator--75545163-91fc-4343-ad1f-e10adb036ebb", "indicator--806ab885-8301-4b80-9ca7-f9c354c83aee", "indicator--83206646-17e8-483e-be8f-52ab24e1a762", "indicator--43a645e6-8d10-49d7-af46-d3db385f580b", "indicator--5633c5dc-9e1d-411a-a39f-68bc8bbfe085", "indicator--4f789fc6-874c-4735-bc32-f725ee9d7c57", "indicator--8e19dcd3-9808-4ded-8432-b52ddaf1101e", "indicator--cacaf83b-10e9-4856-9902-0bd095721c7b", "indicator--c0e12e85-32c6-4a6a-9b52-cf9671c62617", "indicator--e0553fb9-6462-4ac2-ab4a-1a825ac18136", "indicator--95c5628f-e67b-48f6-b26e-e32adac74471", "indicator--a56e7b9a-6a64-4708-bbfc-44c111e115d3", "indicator--ca88066c-e340-4d99-a842-9d650de470e8", "indicator--ea41d209-cce8-44dc-8c94-cb3fae306e0a", "indicator--64b11585-1f77-427e-a13f-39c037bc8d10", "indicator--c2b9f441-77cc-45f1-a015-a4c29b104579", "indicator--038c50ee-f385-478d-940e-b74839e588c8", "indicator--96ba111a-e1ee-48ae-83ed-9b833c578177", "indicator--73bf19f1-bf70-484a-ba60-1884edab5382", "indicator--aa39546c-4008-43b9-ac90-593124041e34", "indicator--7e6ea32e-92b8-4d46-86f4-9e49c739d13c", "indicator--975fb8d1-6215-4c44-862a-65583b67b3e6", "indicator--cbfc9d02-24b8-4d8e-ab5b-f4b7e322b641", "indicator--d57f103a-ef7b-4874-b964-7cf80478584b", "indicator--62401a13-8283-4430-9ff2-cfb9663173b8", "indicator--84348065-5cc9-493a-9b22-bafa9c6b5015", "indicator--d1886e17-c396-477e-920b-1395902eab38", "indicator--77201e27-959a-47cb-b5b8-6173ea24d6cd", "indicator--b49cc630-c422-416b-bee0-008239e9b7dc", "indicator--1bd13e25-a3ce-493a-be7f-cf78c2f6aaae", "indicator--7c37cdc4-1f8f-4b85-93b7-c908d04c571f", "indicator--c079c79d-43fa-436f-b67f-79d55d6114fc", "indicator--208d6828-ab98-4d3b-8b5a-d6b2cf2de48f", "indicator--906a5ef2-13e6-4081-b2a6-80cf5860f03b", "indicator--956d46e3-bcc6-44a6-9f9a-8e8d179c1688", "indicator--cbed91e6-b36d-4b9f-ba96-f896f67381a7", "indicator--312f1089-b7e2-4e02-863e-d5a1d64cc747", "indicator--cf0a8e96-59e2-4052-9969-c67953856934", "indicator--3e650403-2065-4053-84fc-1eae72d18e34", "indicator--350977e0-1cb4-4d3b-ae9e-03037409efbc", "indicator--4c0feff8-1a00-4b25-87d8-c037bb605f90", "indicator--bc632620-58ba-42f0-96c3-e13c075c196f", "indicator--f2d925b2-31f4-4dcb-9b53-e99a93efeea2", "indicator--178a27be-c511-47e0-9fa3-18af8422441c", "indicator--088adf7c-cf5a-4df3-aba0-0f3bc7c9cab7", "indicator--79dbc507-b2e1-4f62-83fd-3a8d1e0330d6", "indicator--ef99f345-1aa1-47d5-97fb-a8019d50e8b5", "indicator--714d92bd-69e7-4760-bf7c-b7670a5c6b6e", "indicator--b86531e4-9fb0-4bfb-afb9-19e19f0d8233", "indicator--5139aee3-7c32-45e0-bd1d-ed7fe490456b", "indicator--4340037c-b6a5-4454-a5e3-fecf0f081900", "indicator--7d551a62-0a31-4922-9090-a4da23ede89f", "indicator--c1c2a7b4-7ac6-4167-92cc-a6da8b5603fe", "indicator--9260b076-bad8-46b9-b425-790468d49ddf", "indicator--7627b293-7fe0-4baf-a017-e5b4e580bb63", "indicator--bce82b2c-f287-48cd-adb0-2495688b4850", "indicator--a85d1713-5193-44d6-8007-bc4b382bca1b", "indicator--68db9a6d-7846-4456-af2a-8bd445071218", "indicator--eeca3625-b938-47ac-9531-3a65af9131eb", "indicator--4284890c-11ff-4e01-bb7b-797f6e01dbad", "indicator--7a38b6cb-2b9e-48c4-b64e-f5b1ca7c2b05", "indicator--89b99a47-c136-4c5d-9069-3327bc49be35", "indicator--6bd96a88-fa73-4794-aa40-09b621f2aaf2", "indicator--f4499e12-2c0f-42f7-95be-a1d445dc1d5e", "indicator--035081b6-3511-41fc-8f69-f5a499b0139b", "indicator--72d587d8-bb1c-45d5-bd69-df59387b172d", "indicator--ad54a1dd-dd24-4035-b1c5-0209fddc8c3b", "indicator--490dfe50-ebf8-46ec-9192-0d38fec11db2", "indicator--4104d499-0a94-4d90-83fa-93465cef5cfd", "indicator--8a1a1d83-02c7-45f7-a959-18d38c55098b", "indicator--939b7541-3f98-487a-bb38-5839db8b0e15", "indicator--f8b4fbfa-1a6b-40d9-aa7d-d74dd8819b61", "indicator--3d334c20-1771-4d0f-96a1-89b6e3f07b50", "indicator--874e6a03-c6d4-4b8a-ada6-f4eb75871b4a", "indicator--18734a78-83af-4b5b-a436-00f0cee18119", "indicator--aacc6c90-3e0d-45ff-a184-32693fefbaab", "indicator--123e70c3-4b54-4c6a-b3c7-8c69c6afaeca", "indicator--28a25adf-9ee6-497f-aaa0-27dd71d2dc56", "indicator--e060feee-aaa2-4f1f-99be-7223dd3acce6", "indicator--db517c72-5b23-4fd9-bb2f-e059e11b2e25", "indicator--626584f8-675d-449f-a50f-0c05806c2d5a", "indicator--88a2a7b5-8efd-4834-b3c5-d5da19a90d07", "indicator--ebca33da-d044-4c0c-a559-0ab0fa77bb47", "indicator--963ebcee-9aa4-4e9c-bc99-27c8d8787409", "indicator--d8de50a6-335c-4942-94fd-ec52735b45e8", "indicator--0fafc38d-9dd2-49c5-8abb-efc34a2eebf6", "indicator--0a143f0c-2744-4a66-a5c2-a500819c4a41", "indicator--e13b3d9a-690e-4b73-97ff-b6c865037813", "indicator--7de5453d-a75a-4d6c-9242-83718e050340", "indicator--0f9b97b6-649d-4bcf-8d0f-083459d574e0", "indicator--91128171-8510-4022-aa4e-d0523d8574d4", "indicator--ad514ed7-8585-499e-8eb6-4b192966ce12", "indicator--98c96876-e9e7-40ae-9e0f-79b6fd0bda15", "indicator--2b7cfe27-fc55-4c0f-b415-e088d687c415", "indicator--dfc8bd49-e30d-476d-a09b-bc09ce92d2fa", "indicator--6585c434-e540-457d-9917-c712be7b7145", "indicator--497f2ad6-c5a9-4c5d-bc10-abc0d9cec3f6", "indicator--baa3f650-7c1e-4e54-9959-f002a16919a4", "indicator--f26402e1-d6fb-4c89-9f32-45e514329223", "indicator--1b21bbd3-ee45-4f7e-b6c5-180177712c42", "indicator--20315b07-41a2-4142-886b-9ba93d4a5a9a", "indicator--7276da86-78c3-48c7-96fd-132e3c3fc47b", "indicator--a73e8a32-47f6-42d3-823b-6e2670f7eda2", "indicator--5f3e5d29-4e4d-424a-8688-94b5d3da8af6", "indicator--09e4d686-af78-4f5d-a844-813ce691826a", "indicator--80f0aae0-fbb2-405a-b2d6-57c49a764d40", "indicator--662017e4-ca26-4555-a24e-ad898be0f123", "indicator--6ea4c004-26c9-48de-8988-8170609138af", "indicator--c0a2c502-0cca-4937-8dc9-4292fdbca33c", "indicator--39731264-e210-451b-891f-94d41d99ee52", "indicator--296d968c-a0d5-4f0b-975d-08a12718eba7", "indicator--219f70d1-2630-4cd8-904b-29fb48baa865", "indicator--95c28e84-fd2f-44d0-85d9-56ddfff217a4", "indicator--fe110200-3abd-44c0-8e37-42a76f80621b", "indicator--f37139ec-f0b6-4dcf-9359-44811b6b4374", "indicator--43e2295d-72e2-48d2-8dc1-88daf5dcb92c", "indicator--bdd748a5-83e9-480b-9ce5-db7b7c427f32", "indicator--4bbf331f-00df-4f27-9811-c077248ed1bc", "indicator--9fa0c03e-a6f9-492b-a41b-6485347f58dd", "indicator--227a591a-8e74-4e33-ba13-a29345146169", "indicator--75f61a24-d88e-48c2-a25d-957c5fb1fa04", "indicator--a093f8b6-cfc8-4375-b2ff-9fed810c81fc", "indicator--a8c6be4c-c8e4-4199-b07f-14b0f00ccbab", "indicator--93022e25-6f85-48d1-9bf1-10d8fc7984ce", "indicator--1ad75d94-a808-47fc-ba9f-2e150f3ab485", "indicator--a8d7509a-2927-47bc-9fde-7b1c68ce020f", "indicator--ff3cd744-61d3-4131-80ba-d47200788fb3", "indicator--8cc815b7-8bc8-4c36-9199-992fd1e398fc", "indicator--01910748-31e6-4050-85c8-2e489664bc0b", "indicator--c9d1848d-7f37-4570-9b44-f8a9ef57b782", "indicator--4153e52c-b69e-4422-9995-0491c7ee0819", "indicator--47edc405-c9ec-4a04-bddb-3f2ff0058af7", "indicator--7fadd49d-41d2-42de-b185-0c8f2a7d5cea", "indicator--0dac7190-11b4-45f5-bde6-011011bbc46c", "indicator--41d0d1c9-e028-4d1b-9973-fcfac8db0924", "indicator--35e4b949-f5e6-4a14-8224-bc8ac205576f", "indicator--23d34b48-7a1f-4dac-a111-a7bfc1b240cc", "indicator--702b6c78-c785-4688-9182-b5e6ce8c54a5", "indicator--47e5cfae-9b6a-4576-a6f1-bd55c535bfd1", "indicator--858930eb-f5be-45a4-9828-5d5858006a5d", "indicator--e7aa22ef-3ad4-4e01-a1bd-66f483ef1bdb", "indicator--a0893b92-97c0-477b-b0ff-6c73d42619f3", "indicator--4f3b5b43-f563-456b-97bf-134bc94c2574", "indicator--28621163-e20b-41d2-941b-891964d97783", "indicator--5c8e5497-79e3-4aad-95d9-2e4630052185", "indicator--3355fd17-d163-4f9a-9adf-9142e3ba6ec0", "indicator--f44ec647-d38a-4d64-9d5f-5b80a0f095f0", "indicator--e8e92754-db73-4cff-be00-473b00c8216d", "indicator--29e2f188-e39c-40fe-a872-dea94feb25fd", "indicator--47bb1cae-74ac-4632-a5d3-ad14198b4ac6", "indicator--cde9c129-5080-4186-9f7c-2c3fd61528f6", "indicator--30697e86-d051-46d1-933c-5350160f0999", "indicator--48569ca6-269d-4442-8086-dfafee3966a7", "indicator--3e23aa03-95ec-4aed-886c-c40cd9e6b9c5", "indicator--0ef68601-3d4f-450c-9845-62ec5d3fe2f9", "indicator--d81912f7-0267-4577-8f3a-5cbea35289cb", "indicator--8e804c75-4826-478f-9bba-8247f45448cb", "indicator--0129bf9a-c122-429f-b25c-1f675562aa86", "indicator--82760aae-1fa8-441e-bbde-e277e9d9be23", "indicator--c5bb800c-9b45-4d51-bc69-ce033752b6c2", "indicator--b04af1fe-5278-4830-9606-c8231d0d3d22", "indicator--94cd5094-7287-4a86-b1c9-17ff1fd7c3ff", "indicator--5c5808ce-abab-4b48-b487-26c94058fabf", "indicator--b1a1028f-3500-43ee-9988-260790d4480a", "indicator--a766c8f5-a1ce-40fd-864a-0a6dd86c3556", "indicator--9c76e32b-88f4-4943-b12d-d4cdda21a761", "indicator--b5914a21-282c-4ddc-8dd9-f95e393562b4", "indicator--0443c5b6-f385-4997-92e4-c8c02b7f276d", "indicator--b57c9ea2-8748-47be-a7c0-8c1b13acbee5", "indicator--5a1ba601-56fd-41f5-a51f-2f53769b702f", "indicator--1b14ed33-34f6-43fb-ab57-ea021fdd533e", "indicator--dc332d89-3e81-4d64-8f32-acc6b421d3c0", "indicator--90c31521-b6a5-4311-aed1-d98c30e8a86b", "indicator--a79f1ede-a17e-4d7d-94a8-32e609c754c1", "indicator--b89b1e70-6f4c-451f-9a35-093de1bf6042", "indicator--b9ba5105-b8df-4825-a5a6-3958b55f615c", "indicator--6625e5cd-528d-4660-a437-4478044469e8", "indicator--d2a9e2ad-61af-46b4-8aab-f08e1445bab9", "indicator--34852992-488f-4d64-8405-f76fa4993410", "indicator--5e6a7432-bcad-4a5d-9de0-8562cd07e3cb", "indicator--16675d5a-d5c1-4f1d-b3fa-e819fecd16dd", "indicator--7ef71494-4ab3-4c65-96dd-35dd7c4d6e58", "indicator--5ea80a24-ac79-4c75-809c-946b03eb5ddd", "indicator--a1ce24ff-3506-4f7b-8bd0-01cadf3fc38a", "indicator--710f297f-6060-48cb-b3c2-e08dba785e1c", "indicator--b8aef791-7f57-4a78-a443-590e3efc9ee9", "indicator--7916a9da-b207-4061-89e4-0daccca4da07", "indicator--259f72a0-4108-475e-a050-dedc086d4d0d", "indicator--0a1a5d64-7019-4cad-87e8-b4180ba80081", "indicator--71e3bc9e-979a-44fa-9a40-3845fa661273", "indicator--08b33068-32ba-4c1b-bc95-092c308c5b72", "indicator--60d4f133-53fc-401a-a5c4-a99d8edde86c", "indicator--feb3c23d-431d-4e57-994b-fd960afe8742", "indicator--f2c02e43-6c2e-4d4f-afd9-6c5c8355d7de", "indicator--9dc396b0-8482-4856-b7d4-2ef98cc07f78", "indicator--20ebe5c9-06ca-467f-888d-4a6cdde5103c", "indicator--ab1e9441-e95c-49fa-8d4f-5b80710b30e1", "indicator--abedc7d3-adf4-44e3-b77e-3074a889c65a", "indicator--3bf5012c-38d6-4cc9-a91b-db48defbacd3", "indicator--a02f09db-267a-4be1-95e0-4aeb2b3ff934", "indicator--047574f1-6ea1-4ebc-860a-cc2690f15aca", "indicator--dc27706c-41f7-4b9c-8cce-33805b2b4102", "indicator--1949f9a0-b81f-4f53-8fd9-b2caa910876f", "indicator--6084e4a1-ed44-4291-b52e-b7e658f4cd2d", "indicator--3fc11220-b06a-4d00-adfe-51b2b8efd2b8", "indicator--232f0f1b-279f-4b4c-807b-51438e657bf7", "indicator--2c45f488-bf17-435e-bda0-39b4c3ba93d0", "indicator--60e27794-2ea8-4b7d-b876-93c944692ff9", "x-misp-object--62d87168-ecd2-46aa-b749-057e78ef86fb", "indicator--5e4b3ebd-ca0a-464f-ad10-70aea4b7ae7d", "x-misp-object--00e2ce66-809e-426b-a464-03a3c73515af", "indicator--ac882397-2143-439d-a35c-29d75328afc1", "x-misp-object--2fd08d36-d4b0-46d2-b04b-e73b5d0dab09", "indicator--6fd4b80d-ab64-4af1-a3a8-ad9b6d395c75", "x-misp-object--9b52878f-f520-4816-a7e5-7d612600a435", "indicator--b6522bbe-f37c-489b-8e4c-c2876a8dbbe4", "x-misp-object--529bb072-ec45-4bc8-9cbe-327e2a8c87fb", "indicator--3f2c3c0f-8e53-4526-97e6-2f13c526f330", "x-misp-object--576829d7-5640-4605-910e-d1d6874e0686", "indicator--908358ba-5ed0-4297-b786-12a4289242f8", "x-misp-object--b43ea474-a729-4dfd-9e40-0822f358eb91", "indicator--ead61ca6-0171-45e8-866e-d771f0dff221", "x-misp-object--75db51bf-03f3-48b7-b91e-a61105c01f5e", "indicator--d29baa9f-3cb5-417d-8a99-0036be91261f", "x-misp-object--72cae686-0ad4-42f7-938e-640b8cf6c173", "indicator--b1f6ca3d-e038-406a-84a1-16f010a477fb", "x-misp-object--7449d241-4e95-4a07-b3d4-e5aaf770bf80", "indicator--63c96554-bdeb-460e-a6fc-f34d987c6f9a", "x-misp-object--fc3eeb39-1a76-4f90-b349-5b18765ffbc6", "indicator--7cc421fe-a7f7-4ce1-8350-e097b2d323a4", "x-misp-object--8007aa8a-ca37-4ade-927f-5a18d2494e6c", "indicator--88bb68aa-24a7-43b4-aa66-2664b2d7a6fe", "x-misp-object--4deb19ef-d3a2-469c-8867-ec0068cdecd0", "indicator--87954ab5-4409-4ea3-94f8-165babf4c710", "x-misp-object--088808e2-c340-49e6-96a5-9b0bc41b85c4", "indicator--2a2dd0a7-5011-4981-9b67-f02c12b8f45e", "x-misp-object--31caa127-b831-4dba-a175-597008420dfd", "indicator--8bb6b5f9-1eec-437c-b4e4-9f383f4cda2c", "x-misp-object--c14b090b-a2e7-4aa9-88dc-22ce1ec164f5", "indicator--ad88c285-5054-45f9-ace8-cdcfa5353a47", "x-misp-object--a5bb37a9-4148-4e6d-af0a-9f0236e9081c", "indicator--c2cc0844-2ef9-4a4f-8073-8d562ec641b4", "x-misp-object--2e469fab-9d51-49a5-8853-f1d932426d8e", "indicator--c0afae13-062d-49a7-a713-9a51b448b3a9", "x-misp-object--d578e159-ed9c-4d51-b571-5222bd7c89b9", "indicator--d024baa3-1fec-4c1a-8553-0e6f98f25421", "x-misp-object--313aaa43-c6cf-4b04-bbd2-2445367ac02c", "indicator--26310581-f95c-4206-abc1-7bf5c0a488ac", "x-misp-object--798d4c42-9a74-4124-9c97-4d480a05aec4", "indicator--e8b4a663-ff85-43cb-8398-8f1fbbc197cf", "x-misp-object--55b4925d-4e59-40cf-918c-5cdf333dacfb", "indicator--ac1d0ce6-08f6-4b69-8614-6ab3044ecc44", "x-misp-object--7ceb59f0-3fa1-43ec-aeb8-16a783f01fe3", "indicator--e1ca9c54-2ce8-44bb-bfca-350de81502ba", "x-misp-object--aa951bc9-ef07-4251-aa0f-4538eee478de", "indicator--6fc8fff8-49cf-4081-a039-736633c0ed58", "x-misp-object--383142fa-6e3a-4f81-9235-567eeb5b0ab6", "indicator--3481a175-cb01-4840-9abe-cbd87234807a", "x-misp-object--8e613b40-bd32-45a9-93f9-f3339ef5265a", "indicator--ee57c4f1-12e8-4d02-9d9b-7aff080fb603", "x-misp-object--09432c45-43fc-42cd-be4f-dadab4fedd84", "indicator--b78c654a-eb99-40d0-8b4f-598364a838d0", "x-misp-object--b9366adb-2b69-4fa3-9d43-aa29ebe4b2cd", "indicator--2a3fb881-8056-4765-aa9a-27a80acc6bf2", "x-misp-object--4bd2979b-dbc0-40c3-9479-14121d9d47c7", "indicator--aef19916-9097-40ef-a7d3-243415f3d0d8", "x-misp-object--2b85fa93-dc70-4992-81eb-df1175ee277e", "indicator--cd330673-923f-4a4b-8ceb-46b108f3e454", "x-misp-object--e2c9a6cc-d8c4-4f67-8c61-5d407dcbba9a", "indicator--0de8f154-20b4-4cbb-bff4-8387a4018315", "x-misp-object--176ed5ae-6f90-4672-9199-96121aaf2700", "indicator--7648e2bb-97f3-4136-8638-19438312c1f0", "x-misp-object--bb073d81-1582-4442-96c3-3154f7c5175a", "indicator--f3f44c88-aac0-4659-ba55-ec85914a6a43", "x-misp-object--223881fc-7e22-4e6e-8e2e-5ef678fe01fa", "indicator--d96379c5-a04f-450d-a1fa-5130b7a9cb47", "x-misp-object--1a591c5c-22e2-4927-b929-cd9648cce64f", "indicator--a18de543-51a8-473e-bce8-8bd40a06da42", "x-misp-object--41054227-3150-48aa-9ff9-e4107aead60e", "indicator--57592eb5-8a8b-469e-bf60-91c626a922a2", "x-misp-object--71ba1cdd-c76a-4bad-98db-d57286d9b019", "indicator--efafad91-2966-44fa-8c60-ddae7045e5d7", "x-misp-object--7bd9928c-6e1b-442f-a824-4e2734b88c6b", "indicator--b5ad9db6-0a4e-469b-8ac0-253343f5ad6c", "x-misp-object--bf16277d-9e5c-4ccb-9be4-d9cfbb73d9dc", "indicator--3aa019cf-6f11-4c11-8dc3-8fc6362cc78f", "x-misp-object--6ee0e6f3-3dc6-4bad-9153-ed89aa3bd203", "indicator--2e764a7c-ecba-4130-9a68-3133b53bf5df", "x-misp-object--e3bd6581-d6d2-4b6f-a9a9-e1b31abb699e", "indicator--d7dfa178-99ac-4825-a28b-5cb6880e06cd", "x-misp-object--e4dcecdb-c624-4a3c-8204-66150147aa90", "indicator--b6b91a9e-68d7-4ba3-8166-f504e3be3b6b", "x-misp-object--21e7e39a-bd74-415d-8e88-f25186436c50", "indicator--e87a965f-c0f1-4f03-897a-b5361fb2d880", "x-misp-object--025f1bca-c27e-471f-85ef-03184b237b0a", "indicator--918be153-49bb-4879-b579-a382954e498c", "x-misp-object--a29d49c3-f6e7-4100-b436-0c41692ab3a2", "indicator--f7385be0-aa1d-4ef4-9157-6daec20898c1", "x-misp-object--ff796147-94b9-4bb1-92e8-2a6fd814e7da", "indicator--62c0a296-7be7-4cf1-984a-4b46b085caa4", "x-misp-object--a9f7b81f-7604-443e-b586-0d3cf4805b56", "indicator--2dbadbc3-f1de-4ffb-92ad-bf50f91c6a19", "x-misp-object--bf998784-79f9-4511-a2b2-498c898e185a", "indicator--d331b125-a13e-4057-b5ce-bf053af711cf", "x-misp-object--de27aef4-ed60-404f-9ba4-597005687128", "indicator--f2784493-71c7-4b60-ad28-ad9a09f8cdc0", "x-misp-object--00ea0bff-a83d-406f-8b8f-a77c7be4c548", "indicator--bd853739-de6d-4768-8a0a-ce7724eec488", "x-misp-object--2730a41a-4db9-4941-b48d-74b906548f6c", "indicator--e910ee1e-2815-4633-b427-104b225074f5", "x-misp-object--e068d586-bfea-47d5-93c3-350f8e62500d", "indicator--815fd311-7b72-48a8-b229-17fd3b51ee79", "x-misp-object--8c70d678-a6ce-40f3-91f0-6f607cf17d29", "indicator--0405a5d7-db95-4327-95c0-b6a0a20542cf", "x-misp-object--484616fd-564a-41cc-ab11-b27601894e64", "indicator--3789b1a0-f5cd-4797-ac5e-3d0818ba37b7", "x-misp-object--5579c4b5-b230-43d8-9886-a6121ec0cb5b", "indicator--fc290971-f01f-4a27-b43c-07cd460da553", "x-misp-object--a32edaaa-09b9-4070-9659-6f65980fa8c7", "indicator--a3b413be-28f2-4493-a5ea-7ce2ddf052cf", "x-misp-object--d355ca07-12b1-4d4b-ae89-aedc781725c1", "indicator--df33d0fa-6d8d-438b-b826-144b187ece1c", "x-misp-object--74b71387-2317-4822-b0f2-01ad97f9047e", "indicator--9af3492c-af01-4736-86e1-3430a33b492a", "x-misp-object--3177bc73-b1ec-43db-bdde-4042d60c51cd", "indicator--eaac6baa-ed1f-4dbf-b0d6-438bf4ce64b5", "x-misp-object--86b6ea9e-9699-4e6e-b2e4-5d289359ccc7", "indicator--f3344dbd-f6a7-484d-a4d9-75fb5e9b9acf", "x-misp-object--f00111c5-411a-4b56-8240-726b65b12afb", "indicator--29e91ca5-7461-4a16-b343-c0fb04e0ce3c", "x-misp-object--58c39a24-6350-4af2-ab12-ad1a4af2e1db", "indicator--12b3a3a2-6f5a-4654-b899-6a56b204da23", "x-misp-object--09e6d590-7b5e-405c-b4fc-55538d5ed355", "indicator--959930b1-e452-4086-8de7-f4eb2211867a", "x-misp-object--075a0a66-ea46-4d51-93a6-8b806b4e06e4", "indicator--48526a88-0d80-4ddd-b72c-eff9063d9336", "x-misp-object--9ce1ccb1-8ae7-4ac8-abb6-3d1526ae1fdb", "indicator--4b8826a4-1cb6-4ce6-b5a7-2ea20fafcfb4", "x-misp-object--d3c98553-110e-4c61-a5e7-048641e3c170", "indicator--34884b9e-28f3-4729-8ca3-8875cae378cb", "x-misp-object--a309d336-b26a-445f-93f0-fce29cdc5fb3", "indicator--b61b3d4a-28e6-44ef-b1b2-a2b36a4eae64", "x-misp-object--0e1f1a26-a52d-4079-96b3-0db6699c2ac5", "indicator--1c0f1467-b600-477e-b547-2f3fab94e40c", "x-misp-object--493ee987-5bd4-4447-a109-50c6fdeeae8c", "indicator--8ebf900e-115e-4b27-b918-a07645b68a14", "x-misp-object--fb7fb320-1174-403e-b929-eb9db6eed7b3", "indicator--2a4282df-4e58-4422-bee3-ed2865b6b284", "x-misp-object--7c97fc9c-4c09-4493-adf7-12e22ac2594a", "indicator--7d7d4a70-ee4c-43b8-aa5d-42b62e4aa777", "x-misp-object--2e02e67e-0651-4277-94da-242d2e623fa6", "indicator--c57ba634-6efb-408a-8c09-2a0e293ca19f", "x-misp-object--3df16408-ad08-4c07-b8ed-013fb5e5776a", "indicator--38d1cb99-e855-4370-a0a8-e182a278c949", "x-misp-object--3f5d58f8-14e3-4c42-a101-615cd46b331e", "indicator--255c13ee-0a73-4ee2-8a83-faa9dd470949", "x-misp-object--55e00e7a-0bd7-454a-a2ea-89b3f6657ffc", "indicator--1e2f2b4a-6d4c-4a60-84ff-7ea3d7593836", "x-misp-object--7ab00ac0-8a31-4970-a44a-af22ef8267dc", "indicator--9dab14e9-110e-4e3c-b6ef-077e8b271b1c", "x-misp-object--a0ef52a5-9179-4e7d-8599-c91ce3cbc3ed", "indicator--de2c6a1f-b0fd-4c3a-8046-6e259ecd7e33", "x-misp-object--5a11630a-39c6-4a6e-aacf-d681532964d8", "indicator--c27ef6ef-3a71-4749-8719-49947bb36071", "x-misp-object--f9421198-639e-495d-97f0-7db5082ce37d", "indicator--ba8d598d-5a7d-410c-9c54-b214aa1962f9", "x-misp-object--b2f94bd9-50fd-45f2-acc4-46affe62f4f0", "indicator--b3350403-f5e2-45ef-b079-da4b4a602c6a", "x-misp-object--a1b404d6-436d-4d0a-b71d-6513a816eae6", "indicator--bd1a17c8-d750-4cb6-9d25-2be9e7d6768e", "x-misp-object--ff1e3b2c-f241-4015-ad25-70421a2bc582", "indicator--0a8550e5-8efd-4a4f-b363-3dca1c72adf9", "x-misp-object--035e778c-2641-4fce-8b5f-2125d049695e", "indicator--c25b971a-bcba-4e8c-bfaf-0b5e6d94b9fb", "x-misp-object--d20df19b-04e9-40d8-a031-3e91fa73ce1d", "indicator--ec94d76e-bd10-4c4e-80e7-1dca0cfdbf6c", "x-misp-object--bb2c2496-37da-47ac-b78b-c312d9b49cff", "indicator--bd495716-d98e-47e4-9809-d662914add7a", "x-misp-object--a4e3943d-0dde-454f-a5da-bfb3cfff5774", "indicator--844f6bfd-26af-4c70-b0fb-96bcfc467213", "x-misp-object--20b5b91c-4222-4eb4-bcb0-1d2b5d65c5af", "indicator--9e938956-b84c-4ad6-b6e9-c76e7c257f19", "x-misp-object--6bdce9b4-2073-493d-affe-89faec431d92", "indicator--1b4abf9b-20e1-4991-9a0f-fa6d85844664", "x-misp-object--707daa2e-319e-4217-9e9e-66961f0944f4", "indicator--3bff3fad-617f-469b-ab76-31ef8d37182f", "x-misp-object--84d87567-a187-4d13-8e8e-fe4968ec7317", "indicator--299df689-5b87-4dfd-ace4-1a5fe47cf0ef", "x-misp-object--f0944434-11e8-4a3f-9db9-3712f278b0bd", "indicator--45436868-f318-44a7-80ef-cfc59e1b067a", "x-misp-object--fa571e37-157d-47a7-b2df-e512c796d8d0", "indicator--7e0b9f43-bbfe-4c48-8bed-9a88843b88f3", "x-misp-object--eabe87b8-0d05-49a7-8df4-7611845f7b86", "indicator--35f19c22-bb54-4118-8e2a-a6d6b78fa536", "x-misp-object--f61a9f17-4183-432a-a0a9-34929221e1bf", "indicator--9bd33707-6cad-4531-9575-2b257af4239e", "x-misp-object--97ca49c9-5479-48e1-b609-7bbde22a44a6", "indicator--7c7d0cab-6614-4d6e-844f-b96a60b80a05", "x-misp-object--e6de3c5f-55bc-47c9-9266-a8c981902df9", "indicator--647f4bff-0d89-4940-b1ff-f68625083a1c", "x-misp-object--af3a4fd1-9f79-401b-a42c-d05b1e190cae", "indicator--9fbbec2e-0c24-457a-b241-dd5313c196a8", "x-misp-object--2fa4890a-b3e8-4140-9c6a-ced8d3f1b4a7", "indicator--3ad9b9d2-d784-42ae-b8c5-09d4ed4ae102", "x-misp-object--fcbdfa58-feca-47b8-8443-d6856341c139", "indicator--7dbc825d-6f73-4c96-8b7a-8cd5a9030b0d", "x-misp-object--319be5ee-9dbe-4d32-9558-174535d5eb76", "indicator--c60a6e18-6be9-41a5-af8b-044a261e8842", "x-misp-object--fec89932-b6e3-4f90-bfeb-b12aa3d8e4d6", "indicator--8ebdeb3d-585a-402e-ac4c-e74d4e7e28b3", "x-misp-object--c4ed2cef-0abb-442d-a321-7f528925ef43", "indicator--a0ba4a94-ca04-4194-8f44-7e109a1d571d", "x-misp-object--90a85fa2-2cd3-44ed-9800-47036fbea5ed", "indicator--448163b9-d56e-4197-b219-7701771f0b9f", "x-misp-object--edf1b1b2-a646-4d36-89fc-2bd73036558a", "indicator--e9731d60-0ae4-4dde-898e-cac8b04a92ae", "x-misp-object--e6bc3456-c3f9-4350-acc0-327d026ebb77", "indicator--398aa11c-cf88-4719-8a67-281a237f5842", "x-misp-object--06b39d87-d102-40a2-be42-99983372e8c2", "indicator--5df60d5d-8222-40a0-8283-c1b60986313f", "x-misp-object--5b646f32-311e-4fe3-b55f-ba211ee379fc", "indicator--0657a83d-6055-4d0e-b18c-e66524986913", "x-misp-object--486237b5-0bca-4be0-b0a9-cf97bad7ec7e", "indicator--8ff99259-70f6-4ec1-8b53-ec2640ff4f76", "x-misp-object--8e77f1b3-ff7e-4e6d-ad68-6908c1a0961d", "indicator--2e76b14d-770a-4609-b3b5-b5ea2d40411f", "x-misp-object--afab1a16-e49a-41dc-8cb3-00b0eb5056e1", "indicator--3ef484d7-e18a-4268-9d64-57a0dc11ec90", "x-misp-object--23503f7a-ba91-4d93-aace-c0bfd9228e8a", "indicator--20f652f2-5da6-4d98-a7ab-ca7e2f1a46d2", "x-misp-object--2891de56-5536-4798-beb4-ebe8f7d526f6", "indicator--94194fbd-1c7b-48a3-9397-78690a14965c", "x-misp-object--11e9099a-5624-4972-a948-fedaf267e4e4", "indicator--da3156db-d5bd-42c1-8acf-fcba17565f99", "x-misp-object--3c47eb42-f907-41c4-a214-ea3bea07bad4", "indicator--c6b32ce3-eb60-458e-a9c4-79c6323bf988", "x-misp-object--a3ed0c52-f5a7-4eca-b69d-7e6c7df2c44f", "indicator--d2983ca3-9223-4a87-b04f-6de51ace37a7", "x-misp-object--eab302f5-7a18-4f5e-b606-4a7411472846", "indicator--522f5599-7a15-4eaf-bc74-74ad5dd77996", "x-misp-object--4cd9d948-55ef-4f84-8e84-b0eb3b3f63f8", "indicator--590167ef-b668-496f-8970-7bd7d16826bf", "x-misp-object--a8374917-93c1-457e-996e-c942d50f31d3", "indicator--1f2972d3-a2b9-4e33-b097-362ad59cf22a", "x-misp-object--ea2bb670-0be4-494b-8513-325713ffa7b3", "indicator--878ff7cd-c5c0-4ad7-a9fc-9fac552d4b7a", "x-misp-object--7529b90e-54c5-43da-858e-524ab68604bb", "indicator--d7304186-e248-49e9-a821-d4e1b2bfff31", "x-misp-object--2f5b67f5-2eb1-45a4-8067-e0619f071a9a", "indicator--bcb35d45-3b99-4de3-952c-eaccba4124e5", "x-misp-object--ec28b665-f612-473f-9512-fd6f869b06fe", "indicator--8e934a55-9f8c-431c-85c8-f52a2574eb6d", "x-misp-object--93b3d657-1591-445c-9a59-22b998db2f98", "indicator--61def0f6-fcdb-4c6c-9557-89fa5c3fd142", "x-misp-object--bb4fb207-7951-414d-ac6c-cc6ab057787c", "indicator--3688243c-dba5-4425-83df-05469b53270e", "x-misp-object--83e74766-26ae-4c43-b22c-d0f6f6871b9a", "indicator--9da3fb39-1b7f-45b9-9c2b-18f02edb7a13", "x-misp-object--984012d5-eb26-486d-ba47-720d981b8305", "indicator--8c2d5422-b02d-4ad5-9eda-e19b2f8520d3", "x-misp-object--1d8386a5-94a3-418f-bd81-ba11f4d870fe", "indicator--7e5e847c-9c77-4184-8d70-9c5e59739b82", "x-misp-object--cb350869-f30b-4548-bd9f-9835eba3747a", "indicator--0cf779f9-164d-457d-ad04-ea623e3076d3", "x-misp-object--1197e5b8-cd16-493f-a5b8-8f9491c300f9", "indicator--7169c4a0-202c-4276-aa95-4209b3d9e92a", "x-misp-object--ac2f44f8-9449-4acb-8612-7068a7fb9c88", "indicator--39872eaa-fca6-44e8-942d-07104ec61f98", "x-misp-object--b5a4ef02-e2a8-4ff5-941f-82a9b7be9f9b", "indicator--85318a94-ab67-4089-9af3-32be44d7c131", "x-misp-object--259af175-f2fb-4292-ba82-692fb829126d", "indicator--b16b9ea1-7e8a-4dd7-ace1-1ce87d453a89", "x-misp-object--a5ae663f-2dfa-4b90-bc5d-ead300eb2441", "indicator--4bada252-c578-43d6-9196-94b816fd373e", "x-misp-object--59a33fb7-bbfb-4df0-bade-05bd106312c2", "indicator--c09dc808-4138-4d16-9516-df61205371e0", "x-misp-object--56d3a112-940d-4480-85de-d34f6cd6ebdb", "indicator--3b583c88-393d-49f8-9b29-3773a8ee7f92", "x-misp-object--5fb79bae-c985-40ec-822e-48bcd90ef8f8", "indicator--0160b000-c718-4bc9-adc4-40fdaadbfe06", "x-misp-object--cf6f7ae6-d0d1-4846-bd3f-eada735297bb", "indicator--2f72d335-4d2e-446b-b91c-9f3ec0c5825f", "x-misp-object--671d9a9c-557b-4954-afb7-84116dfaafdf", "indicator--a5d51c54-9186-434c-9370-1b043a73527e", "x-misp-object--b1c3a402-f547-4396-982a-95a61fc14c24", "indicator--39ae68e0-13ea-4711-b214-3af059803286", "x-misp-object--36c61803-2877-405f-b6b0-5acbe905782e", "indicator--2a42886a-67dc-44e5-bdec-bca5c3b4aaf3", "x-misp-object--09d1177b-e3e6-4f3d-925b-ac25620cad00", "indicator--be44f41e-6b44-4cc5-9f3d-8bf5755c4e91", "x-misp-object--90c6a983-0097-405d-816a-d7d0aa604363", "indicator--c2b35c06-e9fb-4bc9-be25-fc70417cedf4", "x-misp-object--8a87830e-ecc9-495e-84ba-a143f2bcd94f", "indicator--4e1bef3c-5152-40f7-b83f-b29b1737af98", "x-misp-object--6a445163-58d2-473d-9100-c9b17e1d420b", "indicator--059a2690-75da-4ce5-aa90-f93ab97f530f", "x-misp-object--fbaaca08-1b6c-44c6-9aec-171935d04e5c", "indicator--1e10c051-b1b1-44b5-9c28-8dd9e3752a6c", "x-misp-object--8dfb30ca-fe11-45b7-96df-67e092866720", "indicator--1253fc5b-4990-4d6b-957f-c0df3912a373", "x-misp-object--e186fa28-a483-46dc-841d-47cf32443adf", "indicator--80f3ef4a-a9a5-4329-9597-21fb85287468", "x-misp-object--d6ecedb2-858f-4080-8238-1e674aaa6d83", "indicator--9bfa8642-f8fe-4e9e-a37f-5d43e5aeaf03", "x-misp-object--9e583e66-b14c-47cb-815e-a0b0d1e85b4a", "indicator--ee861cc7-1104-4b21-8c06-d0f92bef929c", "x-misp-object--35cc2bf0-ecbe-4b5e-9db6-912ebeefb488", "indicator--3645e877-e229-407e-9b05-f50f5bc924de", "x-misp-object--b73a48db-798e-497b-9654-9467f848615f", "indicator--8d9e3f84-afe5-459f-a511-733d0a6c73a1", "x-misp-object--f7bf32fc-5b23-410b-8f1d-0e5408c44680", "indicator--3fb984a2-e658-4433-a266-93ade5cca32b", "x-misp-object--c7153b15-1d40-4e08-908c-7c2a0d374c12", "relationship--2004b9da-f321-40d2-a109-8fcdb46ffded", "relationship--c68fdf70-90e7-4c7c-90d7-9f9f6f82ae00", "relationship--9f88c670-3c05-44c3-8774-88f9b2d54c93", "relationship--de5c56ab-9c0d-473f-a755-e2dd6904e47e", "relationship--5b689858-9acd-43f0-a1b5-cda2c32f2222", "relationship--fd9c1714-eb6e-4827-8205-961f2773ae6a", "relationship--bb7708ca-3a71-43c0-9b5a-dd6a1f3d50c9", "relationship--388b4ebf-9913-4e78-b17a-4650e78128d2", "relationship--6cc1f515-dc50-43da-8d3e-25e4f7c69c81", "relationship--9b2559e3-d579-4030-b4ee-84e594a33514", "relationship--59c8ecc0-abf1-4cda-9356-1973d66b0ac2", "relationship--7d20cf60-2708-4aa5-ae1b-6e0126aa5a81", "relationship--6a242ebf-feea-4f7a-aa68-845ef148fb72", "relationship--57b1a702-fc0b-4ab2-9806-7c3d5487913e", "relationship--727c1221-23fe-4238-9943-d3edf74875f4", "relationship--3bfd66e0-398e-4c28-a1b9-e9ef6f869b9a", "relationship--1ffe64a7-69da-4f94-bb6f-1ab40824150e", "relationship--939fab23-5ac4-4117-942e-fdd1f2c08888", "relationship--ef9b5cd6-1021-4e1f-8374-e3f890e94c76", "relationship--d399aa71-e332-4ef1-9c1a-688f2c744dc8", "relationship--8080b456-f760-4a71-8c4a-247ed219fa47", "relationship--891c1299-3845-4fb0-ade2-432c6165a196", "relationship--22c2fe4f-d81e-464e-96aa-edd9f19f493f", "relationship--dc9069f7-844f-498e-bddc-a41605ff45a6", "relationship--a4695d0b-41a0-4f1d-88d4-726abc424275", "relationship--210a692c-0082-4063-ac5f-c67bc0cbb534", "relationship--332e1de5-7195-41f6-8ade-b9687142780e", "relationship--df350e1a-c994-43c4-ac8d-8f561e00cdaf", "relationship--8f145969-265e-4628-b4db-229e226e906c", "relationship--dc1c6f11-3f78-45b0-b108-98a5f4ed97c2", "relationship--17de730d-e71c-436e-b518-c7287e4f9368", "relationship--e1f99690-b895-4d7a-8565-bf0222c21014", "relationship--4947df0f-5b9a-4df6-8ab8-1ea73bdc5a04", "relationship--c4cc7cbd-e353-4b7d-9f8d-2fc389b2a5a1", "relationship--69a6d81d-c23c-464a-9aad-c35abf4b0335", "relationship--d7f73703-b1c0-4b54-a742-c92cc763605e", "relationship--6766135b-7c2e-4d7d-a11d-bc74fc62bdfc", "relationship--9690043d-3c57-4d25-9dd4-6e9074afaeb5", "relationship--acdb001b-fdcb-4281-9f32-ca0202471644", "relationship--6dbe4cd6-3aed-4704-82d5-e86fb52c35af", "relationship--fbdb2842-79b8-4d9a-9af7-732addccd91f", "relationship--9684a4ae-07b2-436e-929b-a00c4318c31a", "relationship--0e61d853-eeae-4c08-97be-b18bc6972396", "relationship--3a0dfa34-6632-4589-8971-922b5b8d8b3c", "relationship--13bb81b3-25d2-435a-a3b4-8f0a39771324", "relationship--aaf50cd2-fa9a-465e-a500-88bfb500635e", "relationship--e2e52adb-5a13-4a82-8663-c99776130f3c", "relationship--e1cb436d-98dc-47a5-b0ef-ab9dff7c39b8", "relationship--dcffcf70-7432-44d5-921e-6f4622a9f953", "relationship--e23efae6-c17a-4204-a2df-e4097446107b", "relationship--56d93650-4ea5-4966-8858-3eb100a10049", "relationship--98c1b2bd-89ac-4696-a880-ecb325fcd75b", "relationship--3e521a1e-7bf0-4710-9c8f-b75ba1ada6f0", "relationship--7fdbe12b-7fbb-4b63-8187-54a187678222", "relationship--8f7ea324-2c77-468d-9fe2-10f314299c9d", "relationship--18a04751-3ad2-4052-9ec4-bf637afa4dbe", "relationship--11d6fe3f-bb3c-44c7-9036-82c41508ea48", "relationship--6668a4f7-c58a-4659-a282-6239e6af05eb", "relationship--f5a2b793-facd-4e53-b763-4525b03401b3", "relationship--17133908-6fbc-4d4e-9190-a881dbd1a00d", "relationship--8ab00402-8dbb-46b9-a5cb-be7c566771b6", "relationship--da60edb1-8b4f-445a-b804-441fa40bb62d", "relationship--4127ad47-ce95-455a-beb6-05076300badf", "relationship--99e2ba66-2370-4556-aa47-53d17ebea5a3", "relationship--85789293-071e-42d0-97e4-8b42bd934d83", "relationship--b2a4e16e-81a4-4d05-b422-36423517b3fb", "relationship--ddf82dcc-0093-4ad6-8400-77cfff43ee4b", "relationship--dfee9f4a-6b15-4e2e-9ab9-4bf6c14e899e", "relationship--ee33918a-3c6c-4a91-a9d4-3ca3ee3ff0bf", "relationship--c510d23c-4780-4288-8320-b9d5179269b0", "relationship--b952815c-2b38-48d6-bb9c-0df1d8bf2f61", "relationship--5e8f0b1a-ced5-48c1-8331-091da791ce75", "relationship--5c2f6b46-1a35-4d4e-9292-e6c72eb61300", "relationship--4e8ccd92-c525-4557-a4b9-b2b8b18654a5", "relationship--9aff9112-1a98-41c9-a8dc-6a1b4c6b55e2", "relationship--4aef56bb-32e0-41cf-9810-f8e434ff535f", "relationship--eee1eebb-29c2-4b17-b536-7670b96b7eae", "relationship--ec00ed6c-b650-468c-b481-6dddedc62af3", "relationship--9f10e7ee-7226-40c8-ad68-54c30ff28d22", "relationship--35ab81e6-7b45-4f64-9674-6a03b9dfe1f6", "relationship--eea092a6-b825-4449-9e92-20b8f9501898", "relationship--48c70f52-755c-4f85-8a93-47c0bb8da0cd", "relationship--e748b602-a82d-4660-bf38-ccd2c5d7d34d", "relationship--ede10be1-95e8-4958-b3b1-acba2a1fdf4d", "relationship--30b3018a-75ce-4ecc-9cac-b4364c9bd539", "relationship--98190a39-3476-4f41-b7bb-3da6963e237b", "relationship--a63a030a-f2ef-43ce-ab0b-969828b19c0e", "relationship--1f82d2b1-a575-4b17-bee9-ec590f7b185e", "relationship--40389401-5131-4798-81cb-77874c8b72f8", "relationship--1512dc9c-4308-485b-a83d-84c0d3a65f0e", "relationship--fa84f629-f7fe-492c-b98a-7a4ffdb047b4", "relationship--70428124-b68d-4246-a00c-e11a4bebe40f", "relationship--75ce5e64-cf0c-41db-b55d-eea09d906a04", "relationship--05c30659-6ff8-414c-8ac5-6afb0042de1f", "relationship--04974d8e-d373-4d6b-a132-444c71983c8a", "relationship--013dbaa5-382a-442e-a98d-7a9e1d563e07", "relationship--d5eb5a4c-6082-4c76-a553-5bf4b04ea712", "relationship--e559d0ee-2979-4ec1-b206-fa2378054b34", "relationship--e62fd6be-841b-42e6-a2a0-16663dc83a59", "relationship--7e8949da-74b2-4030-8bef-19cc25866c49", "relationship--0d8da211-dab2-4fb8-9032-00c015132ded", "relationship--1bef8d40-3a97-4b9a-82f8-dd597a393546", "relationship--ec241aa3-3fa2-4677-bc65-cb56f110bbbb", "relationship--72964bf9-9069-42a9-9a6c-1b9d331e07ec", "relationship--97bedba1-450d-45a0-964e-cd556282f3b6", "relationship--860171c5-2ffe-4abe-bbc0-51c030857c84", "relationship--165af737-39f8-4de5-a89f-209a3787d1ae", "relationship--8e35a286-a296-4952-8b09-d6b79ebfb2a3", "relationship--d7d92a36-8bd3-47c6-a7c8-57c58bacfd61", "relationship--b21868f3-30bf-4916-8a2c-5e9cfa41ddc7", "relationship--efd4c24f-1430-46dd-8a36-3a238b289d5f", "relationship--2a37c1d5-5975-48a0-bf6b-8857d6598bf3", "relationship--172ba3c8-0cee-47e3-b970-7b69773c253a", "relationship--796ac887-68b5-4296-927b-08aec4ad422c", "relationship--f73f20f4-c175-441e-ac1d-52aeb79b925d", "relationship--783c2773-e9c9-4ef4-b0df-dbf95d3cfaa2", "relationship--c1b4679c-e6c0-4c88-8a9d-a4afd84fcb80", "relationship--6c1350b0-01c1-4152-90af-85bd5f995e72", "relationship--03ca4333-5efa-4aca-ae18-afdd75f5032c", "relationship--3fefdd9e-b977-4ea2-b9c4-5701b576ff9e", "relationship--b3379a5e-b75f-4625-9ad4-36e2afc2155f", "relationship--e992ece8-a0fa-491c-8231-d3764d073b52", "relationship--46126427-11a6-42f7-87e0-a5fc9b2f48e3", "relationship--e454cee5-b8e0-43d8-8a65-8d5c268813f1", "relationship--70a441af-e2b8-47ab-82d4-41a53789c508", "relationship--e1b87877-0c85-41ff-bcc0-480e73c50a62", "relationship--c2355c18-49cc-46d4-9e1e-5783ca894906", "relationship--23734187-7e33-4cfb-9e51-f51348c206ca", "relationship--969b2246-da93-4ec6-8d12-b327aea994b4", "relationship--c27a8693-b49f-486d-875d-92dbd4774044", "relationship--9924c37b-2634-443d-aa48-a81ca8775d14", "relationship--85c1f7e0-5ade-4ea7-ad4e-0cde7949dc95", "relationship--63166cb2-492b-4ffe-8b0e-d65767c46538", "relationship--a992fa96-7cf7-4a94-9f31-41e7fc37af11", "relationship--b18b7235-67aa-4d54-8a9e-7d391a2cd9f1", "relationship--d9be2f7f-0204-43ff-9d3f-a08e1f944bed", "relationship--7ead6e3d-7db5-4601-acfd-929b7f2bc19f", "relationship--e0c63e04-db1c-4976-b995-e1484598c7f1", "relationship--feeda480-e2cf-42eb-b4b5-a0f130560efe", "relationship--0141af36-f2ac-4625-9c5a-0cbd2f5fd3cb", "relationship--b2be88e7-8886-4161-b7af-a91d5a955eb7", "relationship--c3076218-f449-40a1-a633-f807b67ffdb5", "relationship--ea07c3f8-8880-456c-9a46-82acf2c4b000", "relationship--40d69940-61b2-40e6-90fb-b75d2f217f56", "relationship--0c107145-d85b-4645-81f0-252726c09b3e", "relationship--0de5b9f3-3deb-4b2e-b2b2-9bac7314551d", "relationship--cfe06238-a2bf-40ba-b1e9-ac08bf3571d1", "relationship--0b4a7c5e-ca8e-4e08-a448-b3324d961842", "relationship--f0d1c8d5-f004-410c-8028-2f084d8216a3", "relationship--ef9fbbed-070d-4a14-982d-07e5e6e5cc2d", "relationship--afc6d9dd-0717-4395-aa0b-b94679cbaa00", "relationship--1d9fe018-5761-4799-a977-19bc73851851" ], "labels": [ "Threat-Report", "misp:tool=\"MISP-STIX-Converter\"", "type:OSINT", "osint:lifetime=\"perpetual\"", "osint:certainty=\"50\"", "misp-galaxy:ransomware=\"Ryuk ransomware\"" ], "object_marking_refs": [ "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8dfed048-c049-4ca3-8c61-18e849312303", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.aaatus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b88500ac-0313-4587-a31d-1169f2cb698a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.aaatus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--165a272e-1ca2-471c-a546-7d280a93c8d8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.avrenew.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--55cdea8b-75a6-4ab0-93dc-d455cb2d5a85", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.avrenew.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f086465e-1c86-4f39-90b2-0f29a3889061", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.besttus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b2776b50-8071-4a5b-b2b8-a139a6bcc5ed", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.besttus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b115a272-f614-4d78-8db3-4f5993dfb048", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.bigtus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--85aceed2-4f89-486b-870c-1400dee522c1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.bigtus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--015f2f6f-df45-465b-95d1-928bf070e005", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.checkwinupdate.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--602bf525-e5b4-4dc5-a505-94329b5db176", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.checkwinupdate.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--02443c02-506b-4958-abd0-daccb7f77ef5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.ciscocheckapi.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a199f61e-5141-47ea-8425-dc0e924d7774", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.ciscocheckapi.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f820ed47-f5a5-442e-9848-81df9b3bc31a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.cleardefencewin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7e54e76d-8e4c-4e7f-936c-83097ecffad3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.cleardefencewin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bdb8d512-4b26-4ea4-a1b2-84731b47df17", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.cmdupdatewin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--15f3bc4c-a33a-4cef-b36d-e064ff92a6b3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.cmdupdatewin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4b82b465-a2f5-4646-beb6-875bc34ec338", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.comssite.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0aa27621-17cc-414e-9b59-bc6db1b99199", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.comssite.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--15f46a6e-675b-46ef-a3dd-383e253be58b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.cylenceprotect.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8c5e3e2c-3a04-47e5-aa2d-7352d33420e1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.cylenceprotect.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--11c24aa3-d669-42b5-b6d7-d062392832be", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.defenswin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c6c924b0-5c08-44d6-aef0-992614080b49", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.defenswin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b8fe84f9-053c-40aa-8435-1601ae67c504", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.easytus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3f74ca97-6061-4964-8a06-14d22e059efe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.easytus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--52829006-ac3e-43b6-b6e2-43535645482a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.findtus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e7ebb555-7a77-4f0b-8d44-0b7cfa514a43", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.findtus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--606abae5-2d9e-41d0-b4c5-eebd578d9c1e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.firsttus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5485ef1f-0fb4-432b-8a21-5fef00d02258", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.firsttus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4b8851f4-ced5-4804-b807-9e0e066350bc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.freeallsafe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--795556f3-4f6d-4064-ab59-2f72a50eca6d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.freeallsafe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8b83d295-3da3-4e07-b5b9-b803ab88ac08", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.freeoldsafe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0bd721f4-1b9a-40b3-ad43-180f45a36d95", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.freeoldsafe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8d9a797d-2eb4-4a10-8271-936eead18812", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.greattus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--da1fdbf7-bc84-459a-83f9-4bdc4550ff51", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.greattus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fddcdca8-e126-4f6a-ada0-6f38a7ee051a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.havesetup.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7650875e-7717-4bf7-8f38-47eb8930c14f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.havesetup.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d06f51f3-1b03-48f7-9d5f-73df56bbfc75", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.iexploreservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--681a21c2-28ad-48ff-ab8e-2d1cf815c0fb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.iexploreservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fa210e30-4f71-46b9-af7d-0b129852b5c7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.jomamba.best']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eac77d1c-f26e-428f-b03f-78d93a350784", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.jomamba.best']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--72080da5-bc9b-47b3-8031-9afcc0eeeba4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.livecheckpointsrs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c007fc23-e8cc-4d0c-8a29-0ca57d381d77", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.livecheckpointsrs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4344efe7-991e-4604-a520-63d2567a078a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.livetus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5f1013e5-083a-4326-af9c-bb28524d2eeb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.livetus.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d6544a02-ef46-4609-b4ef-ee0374d91797", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.lsassupdate.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--975d6a1a-5bee-4809-8870-79217305825d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.lsassupdate.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dd0686ad-2784-4f96-82cc-da8564528dd8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.lsasswininfo.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--175bc9fe-05f9-4068-855e-6db13795dcbf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.lsasswininfo.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9994427a-0fb4-4bed-9bee-5e2f71e7b667", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.microsoftupdateswin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--73ac4089-6ea4-4f33-8573-86797c5d35d8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.microsoftupdateswin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ffecfa3c-00bf-4bb4-b5ea-5fe1c628c1f5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.renovatesystem.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a1e41a23-057b-4eb5-89b6-98f536f79b67", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns2.renovatesystem.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0f198735-03ab-4348-bbdf-ff72cedb77b2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:03.000Z", "modified": "2020-10-30T07:38:03.000Z", "pattern": "[domain-name:value = 'ns1.sophosdefence.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:03Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bbb42dd3-05c7-45fb-8950-e561fa3ab255", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.sophosdefence.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9a28462d-55c5-4a75-a966-798612124f22", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.taskshedulewin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4eae81e3-eaaa-4904-926e-1d37ddabcddc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.taskshedulewin.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f7a3c7e8-a390-4557-b3c9-475656c0bfae", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.timesshifts.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--42a05067-6199-420e-afa8-e1dfe1746234", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.timesshifts.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1ba50b46-2a36-4c76-a90e-4ed70698e904", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.update-wind.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cb6fb378-09ad-4dc4-b6ea-e746b51cb95f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.update-wind.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f1850f72-bb08-48f6-921d-b3147514be67", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.update-wins.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9add5703-dedb-414c-8973-805eefeaf3ac", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.update-wins.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a37702ca-0505-49ba-9b2a-e49bd3580576", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.updatewinlsass.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ad26464a-7b56-46f2-a2b9-ab10fa2d146b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.updatewinlsass.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--773eeab1-23b9-4237-93ee-68828651f077", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.updatewinsoftr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--be110bd7-63b1-4daa-bfa2-cfb1d64de018", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.updatewinsoftr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3993b733-9172-4d58-ba15-594082a437f8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.vnuret.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--39373f2a-bbf4-4cd7-99d7-267d7c213f17", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.vnuret.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--63ae4a7d-c2bc-4bdd-92cc-6ef9e90cabbc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns3.vnuret.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--35e82e18-c868-455a-8010-dbd448cebbb5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.windefenceinfo.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bdd77e67-4199-4199-a388-f4a328a868ef", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.windefenceinfo.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--511b7913-beb5-4d2c-8d39-1c5f700797d5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.windefens.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--92cbf44e-1374-4f0d-9854-85d5238cbf43", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.windefens.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--36818da6-d744-4079-88a4-849896fca8e7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.winsysteminfo.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1cbc00bf-ec64-4444-9420-c7ae09525e69", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.winsysteminfo.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aa9a22d1-b0b8-41cf-962f-711ce5619da7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns1.winsystemupdate.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--369e8d63-60fa-4323-a401-336435f1754e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:04.000Z", "modified": "2020-10-30T07:38:04.000Z", "pattern": "[domain-name:value = 'ns2.winsystemupdate.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:04Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f1a33675-c93c-45f6-a07c-4ddcf0582e0b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'an.service1boost.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4dd3e70c-38bd-4a61-a00f-3c971d4e158b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'nm.service1boost.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--290a87ac-c4a5-44ed-af8c-cc850a488d2c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'an.gtrsqer.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cefbdf5f-3879-4529-b8e1-6e2cd25da0a1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'kl.gtrsqer.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--83d0c686-5335-4552-bf94-d9a70ed54ff0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'yn.gtrsqer.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--032d3e2e-0f00-4a9c-aad5-d6412ffb9210", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'ns1.gtrsqer.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6dbdc417-87e9-49eb-92e3-ee5bbfe52575", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'ns2.gtrsqer.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f4374331-ed4e-436b-8a04-97f22c9dcca0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'asd.errvghu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--07f1e4da-457e-4213-976b-e3a8f410b2cf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'nj.errvghu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--68593fe6-0a49-4f73-83ba-97bbfd5caff1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'ns1.errvghu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--88061115-36e4-4c93-9339-924593946e2b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'ns2.errvghu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d57cf63c-4fd6-4b01-b9f3-b590e7a619fd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'uj.errvghu.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--adbfff19-7a7b-4685-95e3-8b0a848e130a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'ga.kungfupandasa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f31a9872-23e9-4e1a-9970-2cf7fcc74ad0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'rd.kungfupandasa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1579a174-dee9-4bfc-88ca-71cec352fe12", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'qy.kungfupandasa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2df701d9-7887-4db5-888a-e023ed683f24", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'ga.biliyilish.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--256321b4-eb04-4efa-a496-df6fbd82589c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'uhj.biliyilish.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bacaa3a7-2d51-45bf-b9c2-a9ed18bee217", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'yq.biliyilish.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fc3d7250-dbd4-4167-bac8-190931fe2412", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'ha.blackhoall.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7a90fefc-2491-4a36-b24c-5194b886d57a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'nz.blackhoall.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b7b8f26d-b2eb-4c82-b56f-928b76b528b5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'yqs.blackhoall.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bd9960f4-8621-4c55-8e96-2cb9501a12bc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'hs.bouths.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--927fb907-9d4a-4e40-8865-e6a6d1e0609e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'ohn.bouths.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d6b84255-5094-47f1-b00c-7f96e74b31a5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'yn.bouths.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--30ee0742-9861-43bc-95d2-74e2c73736ed", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'mn.idrivehepler.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0aeb53e8-43e7-4d86-9d8f-c24eabdd20b8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'mn.harddagger.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a10e8c06-b76e-499d-9c4f-96350482590d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'nv.harddagger.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a351cd4c-a1c2-4485-aad5-d1f1f6fe4c1c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'mv.check1domains.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3dbf2098-d724-4816-8b53-9595dacf5bcf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'qwe.check1domains.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e0e38055-b973-4daf-ba07-5d2132ee036c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'tt.check1domains.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--410552aa-12e6-4b34-808c-8a15eaeeaaa4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'nv.moonshardd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2dffd5d0-95a9-4167-a20f-efbce37cd813", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'rd.moonshardd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e668cb26-80fa-476f-9b95-dccc8f157733", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'qw.chalengges.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--36faefa9-2de7-4c9c-ad3a-4d23a2414bd1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:49.000Z", "modified": "2020-10-30T07:38:49.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'tasa.chalengges.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:49Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ebb228ec-865e-4a14-94cd-1d74ae55532b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:50.000Z", "modified": "2020-10-30T07:38:50.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'tva.chalengges.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ea6cab36-4618-4308-9f76-bc9fd5d6c545", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:50.000Z", "modified": "2020-10-30T07:38:50.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'qwer.toyotacamryy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--98ad36bb-19fd-4fb4-b15c-7ae2211a91c7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:50.000Z", "modified": "2020-10-30T07:38:50.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'te.toyotacamryy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f4090866-08a5-4340-8573-42cf1b8eb8ba", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:50.000Z", "modified": "2020-10-30T07:38:50.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'ty.toyotacamryy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--72877c2d-4103-438e-824c-157865180902", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:50.000Z", "modified": "2020-10-30T07:38:50.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'pl.reginds.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3304e7de-d1da-4dd7-a9a1-979a7c7e053e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:50.000Z", "modified": "2020-10-30T07:38:50.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'un.reginds.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0d2be2f7-4e5b-4396-b2d0-dd9676b3e0f5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:38:50.000Z", "modified": "2020-10-30T07:38:50.000Z", "description": "Less Common Subdomain Pairings", "pattern": "[domain-name:value = 'ys.reginds.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T07:38:50Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f53772f6-4e4b-4f4d-9b9d-a3886377993f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = '0684ad4cab1e7a0f7b0abb0984e5b95eb8a5b1a4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--baa84abe-4146-4f4f-986a-3b4c2faa592c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = '13373c1eaa04fcf71bd4ad098560a387fe0d6a45']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9da3863e-53c5-45e2-b5e8-8f0d0f2e0c0d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = '4cd315fa97ea12b98430d3da639529e974010a17']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--576076c6-f558-427f-871c-1d5e9d4020ac", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = '68d2fb8240ea91a1195777eff11b50a5873191b9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--af6a0a9f-5403-4a8b-9de0-a26b300de9b2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = '84f1b30a3897f65c4ab7a13fa01db71a00293e9d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--de48181e-908e-4d42-8445-2a2dfa37baf6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = '9acd231253a98af6e43319e1d1de2fed828e09d3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a6e460ab-064c-4099-8fa8-ff496465126b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = '9fad5c0e0ef9be03767d14105f416871ccc96745']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5ead3dda-2e81-46fa-8eec-56865a7e61ac", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = 'a07c36bd830e2514f169bc079817c63378a16b05']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--83b1fe49-47af-4705-9362-ca671564c57e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = 'b4018842f1f8ff0e62686fea3bfe3909956ce192']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--547a2b4a-1eb2-4fd1-a357-f0d2d9459c53", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = 'b47c230daebf8c94b85b1f49bf105d21fb708d29']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f258f723-fa2b-489e-97ff-ab7653b15e51", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = 'bf1862fcb564e3e730eaae320e6c79c579979233']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f389df0e-5d92-4e07-8ebe-42dbe36efe9c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:12:43.000Z", "modified": "2020-10-30T08:12:43.000Z", "pattern": "[x509-certificate:hashes.SHA1 = 'c6223becc004d859f0c63af41c88d7b76462d292']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:12:43Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"x509-fingerprint-sha1\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--47b240f5-3693-495c-a208-93b7cd2a4b76", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ad.cantliee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ff964ad0-0b8c-4ebd-8aad-2fcc1fb74c9f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'af.cantliee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aa3ccdc6-7443-45d0-b57a-3039e0a41849", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.cantliee.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b86c3c84-4d71-48a2-9bb7-e563a6d0e02a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ad.hungrrybaby.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b7889f44-e9cf-478b-8062-7eaf815965d0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'af.hungrrybaby.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9f4f70d9-f493-4571-b959-350a5050c1c0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.hungrrybaby.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a5b30b0d-b1aa-4c56-ae8e-854032be31e7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ad.imagodd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3e402d85-6649-4da8-a2dd-0d54392fc5f1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'af.imagodd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5e8eeda8-8f3d-4abf-9444-25991d122df7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.imagodd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--29e3bf99-346a-4f40-a106-7ab26fbf1b14", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ad.maybebaybe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cbf06367-9ff3-401e-ab0a-eb6346be4eaf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'af.maybebaybe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6b94de3f-e060-48b8-b8ba-2fe9531f469a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.maybebaybe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--37894cf8-9159-4928-a53b-950949ac7b53", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ad.raaidboss.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--be60ff22-b0f8-49a8-9486-8a7f7a8e6e3c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'af.raaidboss.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--40d81876-ef8d-474e-b1b1-6398ab83a431", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.raidbossa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1e4e6cbc-8d53-443b-9b74-f3033a036693", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ad.saynoforbubble.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3f4de579-e03b-40c6-b4f8-c309c08ed0c0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'af.saynoforbubble.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--28b771d4-b6e2-4dbf-8418-aa6b2706a8dc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.saynoforbubble.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c5da1e0d-1fcb-4247-b696-0a428276af4f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ad.sunofgodd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f5de0613-fc28-4f6d-b025-2de50ceabd60", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'af.sunofgodd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7a8cb9ee-dd34-417c-8c8d-bf5684f297b4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.sunofgodd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f03331c7-48fe-4f1b-a89a-d5fc4d80af00", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ad.tarhungangster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3df4a1e1-82ea-41da-92f5-bf2a0bbd3fab", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'af.tarhungangster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ecf423bc-426c-422e-a9bc-42cdc56a2110", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.tarhungangster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3c55a5b2-fca8-4af7-82fc-58413a5ca35f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'an.idrivecheck.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c4cce24e-07c9-4b05-94a1-e2c053167ece", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.idrivecheck.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fa6be0dc-10ba-42ca-acca-6d51a68367d9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.idrivecheck.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9e6684e7-a420-40d1-a192-e5b179fd4214", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'an.idrivedownload.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ca3275a0-10bf-4eb1-a087-973ef0b94bcb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.idrivedownload.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fac56ded-07f7-4090-903d-d70af2a53246", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.idrivedownload.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--39081399-833c-432d-853c-a3090d8d4dc2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'an.idrivedwn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cc39f74b-3b97-43b3-a98a-0c076d64f7a1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.idrivedwn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e3c72c6c-c1ed-4531-997a-7fc1f8b83ddf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.idrivedwn.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8aa3b76c-83b1-4da6-bad3-364c1e2319c7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'an.idrivefinder.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--adab092e-dd01-499d-b58e-e42ceb7d60d2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.idrivefinder.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dba8d556-e4d2-410a-a6cf-586eae184fe7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.idrivefinder.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--91633569-0baf-4a30-bb64-358c82f86730", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'an.idriveupdate.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e1414f2b-a6de-417c-b9e3-b9027af50e88", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.idriveupdate.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f0321d25-371a-4104-9d3a-486bd8864023", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.idriveupdate.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2dce37d3-2e3c-406a-9ab5-d84d4c3d4428", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.ayiyas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--29035d3f-d8f0-4581-86c9-e83357b64078", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.ayiyas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1f498b54-d70c-42b4-a6d6-dbc378cb4e05", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.ayiyas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--943e1000-b7ba-4460-918d-f701357684c3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.bithunterr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2c39abc9-6e7a-47c7-b8b3-d887fe1e7116", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:35.000Z", "modified": "2020-10-30T08:13:35.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.bithunterr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:35Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8b62d131-8b8e-46ef-9bb3-d469937aa372", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.bithunterr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ae128ae7-0822-4733-b51b-bdbc7e036398", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.chainnss.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1c99be5c-a7dd-434f-8590-e698af8df024", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.chainnss.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6cd822f2-21fb-404c-8f77-04b10bc00229", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.chainnss.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--55b4a0ff-26d0-44ef-a53a-193fbed78f8a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.giveasees.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--483db1e7-349e-4a9b-b46d-140eea2b6ee5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.giveasees.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9fad4bd9-0fd9-4af4-b2c7-646d8dc51df6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.giveasees.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--51a26adf-fbe4-4f71-9aae-02908402ca8e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.havemosts.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--124f9ccf-6639-45f7-8b61-129f4e36465f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.havemosts.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1282af98-c3c5-45fd-81ab-af3c8a779880", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.havemosts.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1a17ec2f-d2de-4bf9-baa1-428a0108c195", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.lindasak.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6fbeee56-250c-45cb-91df-edf160abe828", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.lindasak.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c3b5e848-4ac9-4cec-87b9-6c452d732ad3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.lindasak.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--67b7dec0-893f-4204-834e-ef9d0230d45b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.loockfinderrs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0fa39974-e9f6-464e-b65a-e9952b710c6a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.loockfinderrs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6e0bfab4-696e-4d35-a448-ac472c0d48fd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.loockfinderrs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--075a4cc8-c45c-455f-8ce0-0626cc2ca2b8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.mountasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e83931df-921b-43b9-ab82-e6f5711aa8e4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.mountasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--80b58a77-a699-4018-b0f6-aa319287d841", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.mountasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--60bdd54e-25a8-4525-b766-3bc7890724bd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.puckhunterrr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8e09d384-12dd-45a7-83ea-5a5323538849", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.puckhunterrr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--68374fd6-d4f3-48b8-8940-9541e72dcfa7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.puckhunterrr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aef6e6a4-b46c-4052-a332-7111b1790071", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.raidbossa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5fefac5b-1a26-4768-926b-fd7d6acd21d0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.raidbossa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--04706cd7-5cc2-4aec-b58f-e1175b264a10", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.rapirasa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e5f6efa7-1ed6-4f27-ae43-0d80cea155d1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.rapirasa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--65dea4f8-3d75-4f9b-a9b8-2f700f729c2c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.rapirasa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--afa03e80-3c53-43ee-93c3-60403b7e9cb5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.serviceboosterr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--48e5002a-8537-4fe5-a2c5-5ae8a1199351", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.serviceboosterr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8b15f06d-d26b-4894-9c2b-2d37a00ca135", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.serviceboosterr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1fe74af2-21ce-4178-950b-d1b7f1f6465e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.servicemount.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1242cd21-1499-4019-aa19-23514930741d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.servicemount.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e073bfb0-a049-4ea3-8e9e-e50ce5410dce", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.servicemount.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3e48c676-87c3-4652-9c72-0600ac303b24", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.serviceupdatter.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5feae022-0583-4ed6-bca5-4cd8970fad14", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.serviceupdatter.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--665179fb-5237-4996-8d56-1fc35091923f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.serviceupdatter.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1b230e00-45b1-43e5-9d42-53055806a644", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.servicewikii.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4e0a416a-50a2-41a2-adb3-42e713489b8f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.servicewikii.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1d5aa17a-e809-49c3-b633-951c90003a9f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.servicewikii.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--05d632a7-b1d2-4685-b416-1778613cfba5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.sibalsakie.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--473fa15f-360f-43ae-bd6a-9c31b49c8e68", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.sibalsakie.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3645c172-c292-4368-9643-6b252cee1257", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.sibalsakie.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d21048f9-2e2c-444e-aafd-473c46b26ec4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.shabihere.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4af5d025-269b-4298-a13d-00588707a71d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.shabihere.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f4f0bd51-d065-4cd6-aaf4-8bd1b82e7ce5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'sm.shabihere.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1ba8521f-0e89-46d8-a991-3f75fd0e015d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.tiancaii.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f075191a-e863-43d8-9bb2-f1f640422f06", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.tiancaii.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--81c12345-d963-4c76-8987-9b9fd296a309", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.tiancaii.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a534ac2b-7ddf-4639-8648-bc3dba854d72", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'as.voiddas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--efa2a49d-bef6-462d-b481-fbc88edc05af", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.voiddas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--28dfe41e-37d7-4ecc-b7ea-be2e0c72411c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'zx.voiddas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f334e275-65ec-4c04-b537-e53379fef535", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bn.chekingking.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--61988f14-72cb-49d5-b71f-57a460e9aa7e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gh.chekingking.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--04145b55-019d-4d6f-afe5-925b37158fcb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ty.chekingking.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--70e5fbb9-9818-47ba-b256-f3f38e4170c0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bn.jonsonsbabyy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ed59cb9b-0c69-4481-8285-3071d8cc0b25", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gh.jonsonsbabyy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d9a80c4e-d479-4134-941c-41b47a8d805e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ty.jonsonsbabyy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--23671ff8-f711-448c-9a22-d0ee4c53510b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bn.loxliver.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--67db0811-0a9f-4b29-8207-6c2437d5d5e6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gh.loxliver.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d26eef13-27ab-4dd1-975d-77cdf75592c6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ty.loxliver.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5be3bcf0-03c2-4e13-8934-2e441ee4cb51", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bn.martahzz.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e873c894-bdf3-4f15-badc-df0fe552d37c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gh.martahzz.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bd9b2dd8-8723-4f38-acc5-b03db726c673", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ty.martahzz.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0053eef9-d437-4b9e-b834-e28ed2f804d5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bn.realgamess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--883c34b2-e7c4-477d-941c-1a1115f6bb71", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gh.realgamess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f2a055dd-2a84-4d95-99cd-eef573fa5134", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ty.realgamess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d1de6e94-d388-492e-8f90-8e1168fdeafa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bn.servicegungster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d26d6450-4f1f-48da-a8dc-0cb5cc66339b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gh.servicegungster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f1e9646c-5240-402c-a28f-4266c48dd6e7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:36.000Z", "modified": "2020-10-30T08:13:36.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ty.servicegungster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:36Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--01af9203-2a60-4cb8-b72b-905e0a3b5ee5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bn.wondergodst.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d9e61e6a-0f25-4e4d-b2f8-329e1037aa49", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gh.wondergodst.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e63f987b-4248-4814-8e68-6667e1d43cef", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ty.wondergodst.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8575a3b7-823b-430b-87b1-1ccdd78d0f3d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bn.zetrexx.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2639130e-2748-4eb6-8bec-f45b86cb6470", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gh.zetrexx.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8e21e7da-790d-424a-8afb-609653b003d1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ty.zetrexx.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5e9c8341-24e1-4522-95b4-87f379ae457e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bn.zhameharden.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ba27dc70-f8c0-4999-8a43-5cadec6411a3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gh.zhameharden.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2c8d0b84-8cd7-49da-a48b-c6d6da430eaa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ty.zhameharden.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fd800e1f-eb59-4bfc-8337-d9e72a6cdfef", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bv.backup1services.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--08489cc5-6d5c-4c9b-9a2f-14750957a95d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gf.backup1services.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f906b453-4d6d-4706-a046-4cc3b954ba47", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tr.backup1services.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b5ee1de0-94a4-4fdb-bb78-a9bc6a14c890", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bv.backupmaster-service.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aecbbbd4-1257-4067-8dc5-8be4136281d9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gf.backupmaster-service.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8724a1aa-943b-40ff-86b9-4ca5c7d7a1ec", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tr.backupmaster-service.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f181f1d9-fff3-4688-b6e4-8d84db72558a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bv.backupmasterservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f3422730-966d-4129-9a32-de5fe08c2e37", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gf.backupmasterservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ad412593-3a56-459a-953a-344bc0426abc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tr.backupmasterservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b382511d-15c8-478b-9d6f-ad7d8296a8c3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bv.simple-backupbooster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f29c1079-29b7-4381-ab49-5b0fa4563fe2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gf.simple-backupbooster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--502531c8-7dbe-42d9-bcf1-14b8cd98d67f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tr.simple-backupbooster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ecdeed69-b119-4f1a-904c-68c885c6ccec", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bv.top3-services.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8fadb0d4-9a3a-4f41-840e-2166080c086f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gf.top3-services.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c7ca6976-2d6e-457e-8d0d-93804111cf71", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tr.top3-services.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cda14ca5-af0e-440c-b5ba-77fc94982e69", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bv.topbackup-helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--af10b7c7-431d-4c39-92fd-5fa9ec897faf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gf.topbackup-helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--36b3c11d-4825-498b-87db-816b2400ca3d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tr.topbackup-helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7b237f58-b13c-4a9c-97be-e35ffa69881e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bv.topbackupintheworld.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f5e4adc9-2cf9-44b1-ada4-3a6dc0b954c8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gf.topbackupintheworld.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--35b6feb7-d983-48cc-83e1-ff4ea7169d71", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tr.topbackupintheworld.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--90e7b7d6-2fc5-447e-a87e-08bba3918f85", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bv.topservice-masters.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--05035135-ea33-42b2-bb12-ea174b206403", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gf.topservice-masters.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3ab2f9cd-1f4c-4fbe-8f0d-c7e08c350f09", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tr.topservice-masters.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--29dbfcb1-a550-4a8b-b48b-705550774e76", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'bv.topservicebooster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5ea3bc25-b6f4-4260-8f28-c82a32d3a2a0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'gf.topservicebooster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--40c3a2b4-8680-4efe-857a-528de382814f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tr.topservicebooster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--16532aa5-331c-4f39-a6cf-637854d434c7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'cv.bugsbunnyy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7336f89a-8705-42ce-837f-1155c9d7b44f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'df.bugsbunnyy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9e0497e7-3d23-4c21-a0ce-dbfec579dbe9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'er.bugsbunnyy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eca175c7-477b-40cc-87d0-45da6e6fcaaf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'cv.mixunderax.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d65ee8a5-1728-4d91-a01a-cdda8bf91f23", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'df.mixunderax.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--65a2bdc2-3c35-4424-a876-bdd00cd8c93f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'er.mixunderax.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--58200074-00f6-4fbf-a5ba-f6fb9dc6a92c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'cv.qascker.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f7d7cc8b-f8de-4624-9b07-d21cf7259079", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'df.qascker.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--31d40fd7-6ce6-4e58-8f4a-76ec3c35b02e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'er.qascker.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0a68d01e-2dd8-4440-9cc1-9aa6c50ad6bc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'cv.sweetmonsterr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--babedccb-a76d-4a03-886f-6e60a2cacb5e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'df.sweetmonsterr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--329bc61c-e575-48e9-b583-07e369f29f58", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'er.sweetmonsterr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f99d45ed-6b8c-4733-afea-005c560c7bff", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'cv.wodemayaa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c3babb5b-b413-4b25-bb85-f0377d423db7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'df.wodemayaa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--09d6eaa4-1888-43f8-896f-3bec781e0541", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'er.wodemayaa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6e523ad4-0b68-463d-ade4-82b29aad2e88", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'fg.cheapshhot.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7a10f783-320a-453a-871d-4d88c8111daa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'vb.cheapshhot.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0ba646f0-02cb-4633-81e6-410b2696624a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'fg.gungameon.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bec4b36a-3ce1-49fe-b4bc-b97124cca47e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rt.gungameon.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a2715236-1d52-4f3a-8e36-73806b779fed", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'vb.gungameon.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f06745cf-a0b5-48a0-8d96-878a015599f0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'fg.gunsdrag.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--04c2c7ca-30af-4e03-9a5a-8dbe248668d0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rt.gunsdrag.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--86c5bff7-477e-4da9-b4a1-a1d44d1f81ca", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'vb.gunsdrag.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4847ec30-4f53-4b19-8408-44e816491a43", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'fg.hybriqdjs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d96b9837-842b-46bf-aa96-86a51e47cdca", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rt.hybriqdjs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--343c0c05-315d-4d1c-9dae-788108dea0ad", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'vb.hybriqdjs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4075c448-8392-4ecf-b17f-d002868ae0d5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'fg.luckyhunterrs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7762bc38-a6bf-457b-97a8-0a5863b3a01f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rt.luckyhunterrs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--97c21d86-a8a9-46af-bda2-5a3afed3aa39", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'vb.luckyhunterrs.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c4ccc306-740e-45b2-beca-25249a9db638", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'fg.quwasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--15cf26ab-c2c7-48e5-9ca7-fc5e08e288a4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rt.quwasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4fd03574-8a04-41ef-90fa-08d7c33be726", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'vb.quwasd.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--44dde33b-8a63-45a9-9752-7757b7e161d0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'fg.remotessa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a6fb75da-98ea-4f63-9edc-5ef7a58ce5e6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rt.remotessa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bfb49304-bab5-465a-90f8-18c395566085", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'vb.remotessa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7422a969-383b-426d-9bf4-25aaef2ade9a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'fg.secondlivve.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b386587f-020f-4444-bd69-5c382052e43d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:37.000Z", "modified": "2020-10-30T08:13:37.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rt.secondlivve.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:37Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aae03945-d37f-492f-843b-a52ed9e8b82a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'vb.secondlivve.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7088652f-541a-4609-9d6c-c65f6f31c066", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'fg.sobcase.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1953f225-df30-4b24-a9a2-917466edfe61", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rt.sobcase.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--93e4ce38-97e0-4dab-9c9c-01e906630a4e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'vb.sobcase.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--252296d6-0a35-44d2-9d9a-a4695900085b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'fg.unlockwsa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--82948f4c-8f24-477d-9454-26c9e09171d1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rt.unlockwsa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d3fce3d8-5668-4d98-ad54-84c4cad0e4e4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'vb.unlockwsa.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e49699df-ceab-4402-bae3-d847f798e146", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.backups1helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b3bf090b-987d-4fd8-aad9-4ac8a3bd07ae", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.backups1helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ed5a5d98-b84d-4956-9bdf-0fe7a1942317", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.backups1helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--46127a4b-0f87-4dd3-b21d-9608b2132a2f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.driver-boosters.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8579e91a-49f4-4d30-9470-61d96287dbd2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.driver-boosters.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--20d561a8-6174-40cc-978f-4559b59a3af0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.driver-boosters.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8d0540de-2449-40b5-b7a4-5f82a4d030c1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.driver1downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--43fe4f9d-21a2-4eab-982c-35063e1cdc4a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.driver1downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--852c0b21-020e-4af6-bf9b-144cc8ff0169", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.driver1downloads.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2bb5b698-3e83-4534-bfb9-712be0f79827", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.driverjumper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7743d3da-4b1f-4882-b0ce-b420483fdf8b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.driverjumper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a1ea2887-8dd1-402e-a26f-6d01a1837425", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.driverjumper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2472f179-de92-4d29-8689-ef542330adf2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.service-hel.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fd3b068e-af7e-45d5-995b-ec9320c592c1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.service-hel.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--693e5fbc-a928-4762-8d89-b9b40a6ffb33", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.service-hel.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--535b0e96-ea61-4de7-8bd1-c557d7760ea2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.service1update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1d85242b-440e-444f-9d27-5d6fff1963d1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.service1update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4538b840-019d-421e-a878-5e378dbb7323", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.service1update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--54ffbf0d-19a4-4378-8801-68e334507788", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.service1view.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--39246bc1-7625-4e67-90ab-41e05ad35a9a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.service1view.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--89d7acf0-153b-474e-b5a4-7d20e1ec1733", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.service1view.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--70c3808b-2d68-42c9-af29-b67479bf7611", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.servicehel.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--32e20e50-8cee-4ee7-bf17-949759ed055a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.servicehel.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--23922432-7036-4909-980a-1ebc15d911e1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.servicehel.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9d209746-ece9-490e-9013-da712c8079fb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.servicereader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--caa580c5-ea95-45d6-9484-b6c376d55f5e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.servicereader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ddd5c3ba-9730-419e-8c76-37954ed1f651", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.servicereader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--482f52ae-a552-48e7-9212-11fe105a6e70", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.top3servicebooster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--951c4df3-7bb0-46a3-90f5-eba0c70ac8ef", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.top3servicebooster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cf1b1e74-0acd-408d-bc17-6e219c111257", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.top3servicebooster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--30d20b4b-7956-4dc8-b356-7fd4f63c19c7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'hg.view-backup.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f7d43580-94b9-4d46-92d4-d9d27258db44", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nb.view-backup.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bd77dc73-7750-42e6-975b-e57f102b1813", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'yt.view-backup.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dc6d1e87-c191-4790-8bcc-6e79c8d28136", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'jh.best-backup.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--88214a6d-8d44-4fad-a703-9ac162236468", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.best-backup.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5c73b189-38d8-428e-b44f-1f7b6e7a94dd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'uy.best-backup.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0b0aef8e-be9b-4e91-b01a-4781b90595be", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'jh.best-nas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--af647f92-c1b6-4bd7-a889-b1c8a58ce3d2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.best-nas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0e6b8f7a-52b2-4c3e-b4f2-ee72dc221c2c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'uy.best-nas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aaeb8272-c8a0-484a-a682-628ed3e6e184", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'jh.bestservicehelper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3450be9f-3b1d-4853-b373-a39f8f5c2646", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.bestservicehelper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ced1e7c9-9294-40e6-be76-20bd66e8113b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'uy.bestservicehelper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c7486bc1-4bf8-4168-a964-d94bd466dcd0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'jh.top-backuphelper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dacac55d-811e-49af-8158-cb422ec21ba0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.top-backuphelper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--72d4f1ef-d0e6-434b-8b56-94bb0155f71e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'uy.top-backuphelper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f8acb3a8-5e24-4c74-af2c-690771852af6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'jh.top-backupservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--70f2728e-e1ad-4b7e-b8de-bc894c225e82", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.top-backupservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7fb187f8-211e-422a-9f22-e36fac615ee7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'uy.top-backupservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0136717b-1b52-4d0d-a3fd-8202c5c9c2bb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.backup-helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dfa4412d-3a95-4a70-8289-22900b8bcefc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.backup-helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e4846c02-5493-44f4-b838-bbe04895dfb7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ws.backup-helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f7d04dbf-68d3-4cdd-925e-bf4502a8bce8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.backup-leader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--31f8c640-d970-4631-a0de-9287266d3f0c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.backup-leader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b173d53c-c6c4-48f3-b43c-af4724505ab9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ws.backup-leader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a02e4db9-2fa3-4f52-a2c5-964470edbefe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.backup-simple.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--474fd1a4-a43a-4f3c-bfa5-b6ab250f82b7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.backup-simple.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7be68d76-176e-4fdb-b16c-788138ebcc26", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ws.backup-simple.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fd4fd1ec-d805-41de-a500-944ddbceae71", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.bakcup-checker.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9c69988d-3594-4649-9307-4337027e981f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.bakcup-checker.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d9dc2a7b-6b8a-4cc1-8dde-a98a1619c1f3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:38.000Z", "modified": "2020-10-30T08:13:38.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ws.bakcup-checker.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:38Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eda1aeee-fce4-4d94-864c-9f6f73a867aa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.bakcup-monster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2a88fdac-c56d-4dd8-961f-5e5766b3186d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.bakcup-monster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1d6011c4-22c8-4090-b0ab-6d8cb577c849", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ws.bakcup-monster.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8ae15166-cbb5-45e9-baf2-fb330d70bc81", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.boost-servicess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ec7cc9b8-2fd0-48be-b9df-3c32c410b365", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.boost-servicess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9ccbe931-cdef-4eca-8110-aa6d201ccc77", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ws.boost-servicess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--32b05abe-3c7a-44ee-903d-6a520d5efafa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.nas-leader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c2175d5f-a057-4d36-b362-61f24daabb7a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.nas-leader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8e62d86c-5c72-47b5-bb4f-2f8d039c8719", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ws.nas-leader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d861c76e-222f-4de2-839c-4f4340ea0e39", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.nas-simple-helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6250a9d3-582a-41f2-b50f-b10150c48ccf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.nas-simple-helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b3c9ecaf-a53f-4875-b285-0d96ab9626b2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ws.nas-simple-helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f7559952-870e-455c-bf16-fdd0522427b0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.service-checker.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a4c5a2ee-84d3-4cc6-bfb2-21ddf0849f35", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.service-checker.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d2ee928c-1da5-4ff3-aab7-d3fcdc1a4f85", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ws.service-checker.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d77691bc-dce8-4838-a94b-4d7b9d9b6e73", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.service-leader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5df066fe-9159-410c-bcf7-ad25baf2ea73", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.service-leader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--00a7c285-2067-4d9e-b698-329377a0d653", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ws.service-leader.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d3429c37-781a-4dd3-89db-f643e16489e8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.backup1helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--284f938e-10b0-4240-a855-050ab5c52ef3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.backup1helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f4330632-7dc1-47b3-850a-a8230a86b79e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rf.backup1helper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--54148e00-a523-4c0c-9803-2c8b857a17b1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.backup1master.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4ea20129-4aa2-47b3-9228-ff229cfa993e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.backup1master.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9d23c075-1251-482d-baee-85ada35c9b5b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rf.backup1master.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--88bf3280-ee48-435c-9cdd-9efd3d675bc7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.boost-yourservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5d85bacb-f0f4-4ce5-9264-2e8a6eee1652", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.boost-yourservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--91e42527-8643-4a15-b6fa-50176ab7c9b0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rf.boost-yourservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--55ccd03e-9c13-4a2c-a5b4-48d6a55a9b95", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.checktodrivers.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--40b184cb-7663-42aa-b78a-ec121555013c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.checktodrivers.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--46d7588f-2dcb-45c2-a279-4bd75b3c3b0b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rf.checktodrivers.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fb1ce8f8-9909-41be-9584-79064e070fed", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.driver1master.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a04bc8a0-b3c3-4612-9288-58e81c4d8355", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.driver1master.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--101aecf3-ab05-4c67-8bcd-e681c2c0c634", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rf.driver1master.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4b747d3a-ee11-4e28-b2e1-94ed973509be", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.driver1updater.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--82d015f4-a21d-443b-a609-ef83d2e25ccd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.driver1updater.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f32158c7-3fc8-49f0-a962-85c16895dbb4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rf.driver1updater.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4c647ee1-64b9-442e-a77f-2d8cf9786b26", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.driverdwl.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e7bcde05-21bf-4d3f-b14a-dfb84c291084", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.driverdwl.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6bea282a-54c2-40cf-a2f9-5d9c2b22d7dd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rf.driverdwl.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--afd6912b-3484-4ea9-a6a9-4fdf28cb3158", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.service1updater.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ec234240-c7a9-4535-b646-8e074dbbb800", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.service1updater.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d5eb7209-d293-45a5-998d-8cac1951174f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rf.service1updater.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7c311194-bcbb-44ff-9c06-a1425545fa15", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.viewdrivers.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7a4d70d1-469e-4dd1-b6e5-e45a072ccc63", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.viewdrivers.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e58c0648-bb27-419c-9976-4d9576de1cba", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'rf.viewdrivers.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ae834617-91b5-48ad-a036-c72589068944", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.regbed.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e1d62bf4-7fd6-4531-a13c-9496aee31df2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.regbed.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d5369813-8387-489d-9f27-40f633a90eb1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tt.regbed.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6d594cc2-a1d0-4e94-bbf9-a8f15124e963", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ns1.regbed.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1e2a86b5-7ebf-464f-8986-07d99191addd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ns2.regbed.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9e90999e-1746-45b4-899c-0ed91f249bfb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'ns3.regbed.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3a7a1d8e-3ee1-4677-92b7-2b168e312a0e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.serviceswork.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7b41ca1b-a163-416f-b3af-deabeb4ef07f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.serviceswork.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--753b5b14-6609-44c6-9c26-372ebb6e9376", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tt.serviceswork.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1120d4a3-73bc-4db8-8ef4-5831277385cf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.vnuret.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--12e82dfd-c1bb-4315-b968-101436fdbc89", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nm.vnuret.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dfba97d8-dc36-481c-8081-8f5f9b26dd70", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'tt.vnuret.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--347b6568-c826-4ad0-a3ea-f22bdf0d1775", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.fastbloodhunter.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c6a7f0d3-db60-4e60-bdfc-8e162d90a1d7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nv.fastbloodhunter.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--73506f1c-cde9-410d-98fe-c1f81e63b87a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.fastbloodhunter.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6046b486-39f8-4939-b8b8-d517a0657d12", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.caonimas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dce27e05-9eee-4051-b1d8-2c974d9a5c3f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nv.caonimas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3b68eabe-c8a2-43cb-a059-481a8ee6da69", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.caonimas.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1d869b9c-e2bc-4b85-87f0-32cafa6d9d6b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.nomadfunclub.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--034b84f4-18c4-44fa-bbb4-45a4a0966abc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nv.nomadfunclub.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--89910d17-ab37-4ef6-9c4f-e6fa03021629", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.nomadfunclub.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c95f0b95-b2ca-4902-ab2c-006b119f164e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'mn.razorses.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d9b3fcaa-add9-4064-b118-8c15d1d4f544", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'nv.razorses.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--61ff0baf-0c19-46b9-8d5c-6adb34f9bed1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'qw.razorses.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2f5ea08b-29b0-4baf-b083-ea89f6a72177", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'sd.backup1service.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1b7998b7-3724-4ced-93ad-2bf684b74c24", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'xc.backup1service.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d08043a0-b2de-4c11-b987-3f29d653e78a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'we.backup1service.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7a5bd8b1-8a48-4728-8913-cca0bb8c1c37", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'sd.elephantdrrive.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aad0927c-115d-4424-8220-384edf90118c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'xc.elephantdrrive.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--849f7b63-d899-43d2-a0a3-a650a2b62ebe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'we.elephantdrrive.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--450a8cb8-3805-4af9-9c38-ca28d68bd1df", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'sd.nasmastrservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--640fb10a-5786-4eaa-9954-97a042e711b5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'xc.nasmastrservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--def6728a-b08f-4fe6-bbb9-ccde0ee75b8a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'we.nasmastrservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--10a44540-2ac2-454f-b97d-fda1e0607792", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'sd.service-hellper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a765235f-b566-42eb-ae29-be94bb9ad842", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'xc.service-hellper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--27574dbf-1302-49f6-9360-0785840d4a4b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:13:39.000Z", "modified": "2020-10-30T08:13:39.000Z", "description": "Common Subdomain Pairings:", "pattern": "[domain-name:value = 'we.service-hellper.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:13:39Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--62ec0c04-da00-4dc1-85aa-888b8866ec16", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '01ad70e688a4eb070e90538728de699efbaa6bbfeaa728976053384587e45d18']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--81c28e98-9c62-4ae9-9909-37d64728c28a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '032a087b0f7c722a64bbced9612e84bb0a7f1872a8b94406ca49827d56aa466d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e47cdf96-2f8e-4c55-acf0-5e98f1dc51db", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '04a4a9ff0af9fde923fb8203c89be6a57a3c42a517c9d9a047fb7d4b20e24a9f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c494b3f4-b64b-462b-bc83-208415420168", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '062fc14064495f558e1192b675c1f0eeeb87c5ced5c01f81a38fc6b2591508d6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dee40d99-b6ad-4da8-a40a-5b7fcad243bf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '0856b3c06805d3935b1db325c4e9c9131572b4cf09f07d989911495807775cab']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--24670c34-ba21-4807-8a90-ed5ae82a1e53", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '087d2b51bec315fdbd938405c9cdcdf63f0d0bda42c7db89062ef3cccc45b525']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8a8644a6-b8ba-4147-9575-b8cee0b27e50", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '093ac1213b112c7eb7c46000f04160af37339ce0d6fff514f0941f2b5ab48829']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4f58a54a-70bd-4909-a347-31acb2d5706d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '0e464ad7bde50e55aa42dac985295e22deb78c1a48809563f18cd4a6f47a104a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c028bd4d-69ca-48a7-a6d8-83e9f14dde0f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '10f0cb6dc3bb42145482fd3b353b11626283edd62b6a6a6b1505927d6d71a914']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c9cee02c-3e29-4515-916a-3f31bf58126c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '118611de57551faa4b7c029e50317cd6f596275725f61a9f9a11fb59e1ad70df']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0b411a58-444d-40fd-aad5-73c145cecedd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '11d2e042f172811cd155e07a8f7a3830e590997b87be68cd9b076477bbc98dcd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--922434aa-d603-4d22-b1dc-a39128d350e2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '151983eab306e5fcd22b110cf36ddc2357564d40399d08ce8a70d7f78b0bfbbf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--409f5ab8-7060-4b72-a10b-0b0be19048c5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '15305978d7c42e26d908feca9aed4efa3df89ae6524ecce10752a2ee3cdf813f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--16b6045f-ca74-4d51-9682-5d0c85c997e5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '15fcb756a05b69518be5e32b98b25f398e999d4ec971364fe01f9dd0f78747e3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--94ba7e87-0654-4786-901e-4b5050d008a4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '1925d5e283a220497385b4d8ca268665c729d1e029692e23431c327a8378fe23']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--75545163-91fc-4343-ad1f-e10adb036ebb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '1bc061bbde8e89345da6461916fc70a4b2b50126ba25f553e15fa692bc22e92e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--806ab885-8301-4b80-9ca7-f9c354c83aee", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '1c05380af47696f7d7ef84b452fa4f662158d9f1caf7ad01a455061081d13653']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--83206646-17e8-483e-be8f-52ab24e1a762", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '1c1397233114820f366607896cb9f3d3d412270e79947ce1558fc8db7dcbb602']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--43a645e6-8d10-49d7-af46-d3db385f580b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '1dae20a13c71c11f3c2a2010d2577cd2b3601c1092a980c1305991681b178c46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5633c5dc-9e1d-411a-a39f-68bc8bbfe085", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '1f9194a46385dfef7bd1098b3c5da2b8f2d2552c9c1d1b6bf3f7313ee970b9a4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4f789fc6-874c-4735-bc32-f725ee9d7c57", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '21ead6c4722d06207332710f2dff6005bc5095034cffa7f60e57a77f651efa1c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8e19dcd3-9808-4ded-8432-b52ddaf1101e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '22caa1e9f4b2e88b7bcd633e4e12104f4d3556c05fc4db1ee6b620a9d5fa6213']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cacaf83b-10e9-4856-9902-0bd095721c7b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '2376a8da650c124b3d916765f82929b4109f20bc4f211a39a4d1cd4391780d1f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c0e12e85-32c6-4a6a-9b52-cf9671c62617", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '243408d1fa0c8a7a778d8bb224532c649409d0db76fc0ca2be385d193da22b1e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e0553fb9-6462-4ac2-ab4a-1a825ac18136", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '24e8413c8743a2349be66e1df415f8e8c8326b3e9fb8b4f158f8fde4409626af']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--95c5628f-e67b-48f6-b26e-e32adac74471", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '25f051fad96d0996708561ce734bb836c4a576f8cb4d6f96927975a08eff9e19']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a56e7b9a-6a64-4708-bbfc-44c111e115d3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '2788d54e094014cd18ec11263659c344330b55ff3b0a14941215f14557b77777']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ca88066c-e340-4d99-a842-9d650de470e8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '2a2e39586e7232a3339d52453b477454bc44b6305c711dd9eb5ecf4394c55b10']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ea41d209-cce8-44dc-8c94-cb3fae306e0a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '2af2ab80575400c191925d15f83726718655b8adad1c7bd02e4abe21d1004b95']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--64b11585-1f77-427e-a13f-39c037bc8d10", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '2cd01dab44247dee9c0f9511b3b1d11d5a69afcc87efc59446238021d5343aad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c2b9f441-77cc-45f1-a015-a4c29b104579", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '2dcb2f1fe7fc145529c31328c150cd9a00a8b02e57a69f09211db334f78fe784']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--038c50ee-f385-478d-940e-b74839e588c8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '2facd367c1299ef200934cfd06279f177f9e3145164e4bd595e2b94a403a1b02']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--96ba111a-e1ee-48ae-83ed-9b833c578177", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '31045ab2d2e8f7074e2d0f312b4b79387a6794c4455100d501f6c5ea220ad207']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--73bf19f1-bf70-484a-ba60-1884edab5382", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '31e9c92d7dce8b65dded9c40e67d9cfca33bf8870d460e73b02df8a035ca719f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aa39546c-4008-43b9-ac90-593124041e34", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '32839e342815cda42bef871d999d76db91dd465972a2b39d4e29fb367a57cfd5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7e6ea32e-92b8-4d46-86f4-9e49c739d13c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '328456cc7c585d290ba0543f6183afb0f8e31a1cfd24019644ea6471129bad9d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--975fb8d1-6215-4c44-862a-65583b67b3e6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '33a2b228186f8391a15442fc1333827fc2af5468c40d1a1552723245922a6812']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cbfc9d02-24b8-4d8e-ab5b-f4b7e322b641", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '38bfb870f8e127f2170175fdd902c0891c9a6c044d8fae6dc9e8ef6d5a9497ab']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d57f103a-ef7b-4874-b964-7cf80478584b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '395173829ff0e957a2d8abbb3c979f470701cd3fd381e7af23b13e7573cca5c1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--62401a13-8283-4430-9ff2-cfb9663173b8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '3c484486d455b4c13e8fbbf612b4ab3c4cfc519dd5a81c2478a7e4ab9c08e83a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--84348065-5cc9-493a-9b22-bafa9c6b5015", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '429650c8e59459c0150ad5cb8853cb46415b70afb92f45ebc04e8c5fbd382bf2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d1886e17-c396-477e-920b-1395902eab38", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '42d914b10255499859ee5919b183ca521ae483ac3edc2f1653d52487f9098342']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--77201e27-959a-47cb-b5b8-6173ea24d6cd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '4544b478b2029ec38eb4bda111741a10f0684e38f1b29ce092b93df882d11f9e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b49cc630-c422-416b-bee0-008239e9b7dc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '484418a9516fbe04de0d99704ac521b04825bfdbc4abbcbf1ba88a28c26373ea']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1bd13e25-a3ce-493a-be7f-cf78c2f6aaae", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '4e4eb3f6f85c8b14003168e9cd9d82c716cf5c04f1d7cb2f003d1ca233d75eed']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7c37cdc4-1f8f-4b85-93b7-c908d04c571f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '52951e174db7986b334417d5641b06a80464c9665bf82393857fa6700beef006']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c079c79d-43fa-436f-b67f-79d55d6114fc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '57b75ed78a4b94749fe25b14e7a6e3b357089b060b88aeb7a30144c6713e5afc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--208d6828-ab98-4d3b-8b5a-d6b2cf2de48f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '5929962b379c56626a04052bc8e983732b807c34fab6c1ac420d73a8fff9e9a6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--906a5ef2-13e6-4081-b2a6-80cf5860f03b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '5b02e00797b0f396b40dbb8223d034a7aa42798a39a89a41ea70a314ceab478e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--956d46e3-bcc6-44a6-9f9a-8e8d179c1688", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '5c3569c166654eed781b9a2a563adec8e2047078fdcbafcdef712fabf2dd3f57']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cbed91e6-b36d-4b9f-ba96-f896f67381a7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '5eddf95ec34e512d6db1058fdd9fa886e3fc1e7d4090d1999f1764627db5c1ee']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--312f1089-b7e2-4e02-863e-d5a1d64cc747", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '5fc68cab9ed345259fa2b452f63e9bc9b1c61285fb0445e60b2744c211bddeb8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cf0a8e96-59e2-4052-9969-c67953856934", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '5fc95870132e4709a5a0086593490cd04eb121f2f238b44cb19679125e842115']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3e650403-2065-4053-84fc-1eae72d18e34", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '609401cd35b4ede77bb717005bd2875f0a018442e194ec8af78595f185665f12']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--350977e0-1cb4-4d3b-ae9e-03037409efbc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '60a45919ec5e67c2843fd08745f26437934ae3ceae76133a23aa0690d6a72f86']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4c0feff8-1a00-4b25-87d8-c037bb605f90", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '625bd1db4f5fbd8fa9a4c78bc7f1ffe421dead5b0b0b4b2a65be879f9a123a23']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bc632620-58ba-42f0-96c3-e13c075c196f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '641a07800e1e9542d0756a7bb740f80ec49aed633af0add108a6e00671e10757']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f2d925b2-31f4-4dcb-9b53-e99a93efeea2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '65783de1310a32a96a2f2ca60093be27ddb32562f91104d7886fac7479ad8afe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--178a27be-c511-47e0-9fa3-18af8422441c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '68547344839166ef8e28dd31b40b35d94759eda2949eab654bf737dfe9d3edae']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--088adf7c-cf5a-4df3-aba0-0f3bc7c9cab7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '694818ba3bbbd14949fea1441dd15ec721adc61f7f7de4cc728f449a2ef2c3c8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--79dbc507-b2e1-4f62-83fd-3a8d1e0330d6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '6abf2716ace0464a488e5ed4d1935865d4d12886ff54fbb5dd659bf32f1cf23a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ef99f345-1aa1-47d5-97fb-a8019d50e8b5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '6f55f3b1415b5bf9dda57158f05fe628edb92b436887ad72f3d4bd108e8542d2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--714d92bd-69e7-4760-bf7c-b7670a5c6b6e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '70ffcd7e8663a2aab204eaea3daf86e9cff73872d23ad3da2e91382f8593501a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b86531e4-9fb0-4bfb-afb9-19e19f0d8233", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:05.000Z", "modified": "2020-10-30T08:14:05.000Z", "pattern": "[file:hashes.SHA256 = '7187ec55dcd998f3ee207a0733a162604c40dc6920ef47424bcbaaa1dba68da3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:05Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5139aee3-7c32-45e0-bd1d-ed7fe490456b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '71fe1f1ce713e265b2c6693f83ed94a359e43e6aa60322baee599ba74a2f2ac0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4340037c-b6a5-4454-a5e3-fecf0f081900", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '728a8ea36c4dcaa030c2a8674bd4b65eb636253435c5d43e74d8a176a92f7679']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7d551a62-0a31-4922-9090-a4da23ede89f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '75d9c67b853fb26ba28ae5dcfc0631fd9fc4addc69d579edfd98bbbbdb4d9187']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c1c2a7b4-7ac6-4167-92cc-a6da8b5603fe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '7753fd8c401e0efd8e5d0db07ea7b60eb45d034b7685b656d708f3885d8e7906']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9260b076-bad8-46b9-b425-790468d49ddf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '798d9d960b1a6dba959831983573ce7de2ea376f13f1e0fe7968beeca37f0540']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7627b293-7fe0-4baf-a017-e5b4e580bb63", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '7b8f932ca62ecc8e0a071177075118ba4b050f785857925a3dac6835e230d602']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bce82b2c-f287-48cd-adb0-2495688b4850", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '7bdaaf431bbf0880b0f1276042bd1adeb192d183795c30834b61e2335d279230']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a85d1713-5193-44d6-8007-bc4b382bca1b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '7c64c488a58473d9456d4f2f64b7bcb5eea03c32bd99650c59e38b0993eba7b3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--68db9a6d-7846-4456-af2a-8bd445071218", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '7f901d8f673d5e1fde07676b3287aa9a24dc92fb48e7ca82a163e0b0581ee7ad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eeca3625-b938-47ac-9531-3a65af9131eb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '8074bbc62a36ff2c0037634d3c45fdf40bfc372a7123f64c38f159c04d2391c6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4284890c-11ff-4e01-bb7b-797f6e01dbad", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '82ccc3e53246b4b931c7d6642b70de245d9896b6481b273ee50aca3c58614027']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7a38b6cb-2b9e-48c4-b64e-f5b1ca7c2b05", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--89b99a47-c136-4c5d-9069-3327bc49be35", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '841680207f8c57f4e183610f022f01642d86c5a2fd0323463039b751e5559dc4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6bd96a88-fa73-4794-aa40-09b621f2aaf2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '8447befbf1643aae5219fc13354628f00c61683fb7b86bb0294a95b3eb62a344']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f4499e12-2c0f-42f7-95be-a1d445dc1d5e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '849c4687f36eecc3e3e5f68da5ee1b2b5c1fe75811db66633962af9a749ff355']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--035081b6-3511-41fc-8f69-f5a499b0139b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '86c18925097fed036b2f63a8c50891266b6d5f0ddde84ee57f6c4da06e77100b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--72d587d8-bb1c-45d5-bd69-df59387b172d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '88da60e5764ac7ead4db3a9ad0aa9f40e509a1d2df0380fa2e55cfdc8e3ad70a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ad54a1dd-dd24-4035-b1c5-0209fddc8c3b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '8a4515c285fd0779292f0ac7d08f6bb5b6fca00a23ce98133e52625ee11bbf36']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--490dfe50-ebf8-46ec-9192-0d38fec11db2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '8b6c3018958e7ae20989045811358b1225606000c879000c779444cc50290d9e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4104d499-0a94-4d90-83fa-93465cef5cfd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '8dde9b01b0e4eb47afff7daf5d59abf72e68ec6d944a9404f78ba69fcbd5310d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8a1a1d83-02c7-45f7-a959-18d38c55098b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '8ddf1b190498bcc66f510005f0e1efc2562e189887924ddb7e584f04437e78a2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--939b7541-3f98-487a-bb38-5839db8b0e15", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '8e421c6145b4ee499c747c7544d16f331d0bfd282b40efddcf66d8eb3fbf51cd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f8b4fbfa-1a6b-40d9-aa7d-d74dd8819b61", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '93193c90f568ae1ebdbdd5607c00ce250f6c886cec60724bdcf5e25c6ba82554']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3d334c20-1771-4d0f-96a1-89b6e3f07b50", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '956cd22a033de80926083810a0946ad764e0df61dfc0ad09af5e1947327281c9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--874e6a03-c6d4-4b8a-ada6-f4eb75871b4a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '959e289a72a49a27d173d5c020969e27aa078a1521b3632ceb5e8c77fa01a342']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--18734a78-83af-4b5b-a436-00f0cee18119", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '95d4c0e642a3b2c9fab0a2d90b2d127ed12d9ae1e8e721806e9eefc75d77ee3c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aacc6c90-3e0d-45ff-a184-32693fefbaab", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '98266835a238797f34d1a252e6af0f029c7823af757df10609f534c4f987e70f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--123e70c3-4b54-4c6a-b3c7-8c69c6afaeca", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '991a222bdbeb5d25b9f9445496112af904ac7b677b6296810727e6e403f5f5eb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--28a25adf-9ee6-497f-aaa0-27dd71d2dc56", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '9bf2fd111962a5634e7b1a5821b08584002cf304d657840a904d3388967a9a65']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e060feee-aaa2-4f1f-99be-7223dd3acce6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '9d8cbb2bf4801276de2143ccd64a7d0f66263809a90bea0b664282a15d121d9e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--db517c72-5b23-4fd9-bb2f-e059e11b2e25", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '9dce80e3b848c6a52a89e89b4d8904635a7a0a6a069f6c164b2becb5eda4d814']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--626584f8-675d-449f-a50f-0c05806c2d5a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '9df20496f03f1e916dbaecbe7e99db411cd8044c13572d691febf13c22b7c572']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--88a2a7b5-8efd-4834-b3c5-d5da19a90d07", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '9e513f9876410f792a0f97c8bead2122c9f26cf07136fe8afbac8da48120953b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ebca33da-d044-4c0c-a559-0ab0fa77bb47", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '9e99facf8ea4c39a5d2bfc404fbae99b37bae36ab589a2a67acf23d03de96512']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--963ebcee-9aa4-4e9c-bc99-27c8d8787409", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = '9f74293d070390a2f783030eed5de4c64b1d32e2046b8c440cc39984b453b12f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d8de50a6-335c-4942-94fd-ec52735b45e8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'a14e3907f7a12b56bb67b178c722d92d2ee64fb0514daadd902683c799bfdc94']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0fafc38d-9dd2-49c5-8abb-efc34a2eebf6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'ab99e91e1b0951feabd09d049e0ac9d9412c67603415c10cbeadde5842ca02d2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0a143f0c-2744-4a66-a5c2-a500819c4a41", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'ad0ee372226ace062473e01b15b52d99eb61a6f3b265bead8f2c534f75d05cea']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e13b3d9a-690e-4b73-97ff-b6c865037813", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'ae696adba9e93dbc97b2f0a0c13c962cd90e5b03943e68f06e6e1b8f8d6cbd00']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7de5453d-a75a-4d6c-9242-83718e050340", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'af29f3aad49a10827b338f156d4f748bcd9d987f1400c52f979efcb4ef4e5e46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0f9b97b6-649d-4bcf-8d0f-083459d574e0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b0a5775907994eea4adf0faa505b28160d22507c1690ca508820e26fb4ca3bca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--91128171-8510-4022-aa4e-d0523d8574d4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b1232c4080121ac93b5c6f3982f79ee1ed4238d568cefd6eb88e7dfb072f0db8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ad514ed7-8585-499e-8eb6-4b192966ce12", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b1798973f8dfce5777905452271f3b3ff23fb2148978ba2943654a72fe5b6387']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--98c96876-e9e7-40ae-9e0f-79b6fd0bda15", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b1eb0565b958d4819138a72cf38b16d058cfee00097461c5dad3fae500aa4296']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2b7cfe27-fc55-4c0f-b415-e088d687c415", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b2891d26b7b66dca32f02681a0f1f3866a2efae49d8b5ec6bf4cbbdf5ff35260']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dfc8bd49-e30d-476d-a09b-bc09ce92d2fa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b294f8636f7ac5318560f3b8f949c1004340923d6aaaceed93481c3ba916d407']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6585c434-e540-457d-9917-c712be7b7145", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b43bb3af257e2c29ecf9add2ef4ad41c62e6b1298dc9af220ab0a285e23cb9db']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--497f2ad6-c5a9-4c5d-bc10-abc0d9cec3f6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b485bcb29c5bf53269960a243b051d4fafcd4ae2b17839e96afbf8f8fec8b244']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--baa3f650-7c1e-4e54-9959-f002a16919a4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b62ba19f3f6ab6200a764a14a268cbf21efe3b48030f7a8bccd96300d56ec950']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f26402e1-d6fb-4c89-9f32-45e514329223", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b89742731932a116bd973e61628bbe4f5d7d92b53df3402e404f63003bac5104']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1b21bbd3-ee45-4f7e-b6c5-180177712c42", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b91b4d45b41d0d0ca1bdfac917c4cd732d32754bcfd7590ac521dc4fe414ebd5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--20315b07-41a2-4142-886b-9ba93d4a5a9a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'b95be82b7682341cf7e2b8e33f1ca0c8915ee005bd71c50ad877da99c7ec39f6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7276da86-78c3-48c7-96fd-132e3c3fc47b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'ba2a96dae66324df5bbb0751a04c538722ad49daa12d51625f8a1890608b1168']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a73e8a32-47f6-42d3-823b-6e2670f7eda2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'bb412455c3988a845ee04cd9f665df285bb00dfb62af377ff9a06d6f032e3aa1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5f3e5d29-4e4d-424a-8688-94b5d3da8af6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'bc08bc584b06c8866c6b4feeeef745e187a8ce0e924d159d5044e6368e4bf31a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--09e4d686-af78-4f5d-a844-813ce691826a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'bc84fa150decef8b33811a646be2fe517f2550bfa03036b8766ff338c3d37df1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--80f0aae0-fbb2-405a-b2d6-57c49a764d40", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'c0595bfea597e67c4e7291e60ed124c5b6fd47eca5d2a2dee4ac61864ac6dc5f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--662017e4-ca26-4555-a24e-ad898be0f123", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'c0af45fb5b5ecaff8130bed61a8cdb4bac98f2c9ccc774bd6034576f865aaf6f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6ea4c004-26c9-48de-8988-8170609138af", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'c498a138ca1fb1ae1c834cbe5f76eda226b0fa7b29bc6cbd8b92478e394b287f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c0a2c502-0cca-4937-8dc9-4292fdbca33c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'c9b06152ac1c851eaed84ee052c374341ed89d9a6e5a5d97bd0e4b941c01a274']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--39731264-e210-451b-891f-94d41d99ee52", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'c9ffb0e9c3df23bba54debf0f6875ade683fe29f4ca720d2abc780179a2781cf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--296d968c-a0d5-4f0b-975d-08a12718eba7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'ca4963745454cc8584cec4e53d27d78c86a4766a4f69b0b37617efcd915621c8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--219f70d1-2630-4cd8-904b-29fb48baa865", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'ca8d8d55c30ed37ce1bc36e514a3fee5b0bc00ef5c88b8d07d51dbd9a141ff33']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--95c28e84-fd2f-44d0-85d9-56ddfff217a4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'cb039efaebc29c1cc5c0fcf8567de534993f447245a45db03c927af56f7096d7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fe110200-3abd-44c0-8e37-42a76f80621b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'ceb4bfe175798179b0947da1ffd8eda13777b9d7b02bc75599b6f6907cf2c2c0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f37139ec-f0b6-4dcf-9359-44811b6b4374", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'd22cfa87be0f204ae7da13897dfcd075c9f25414e1792762412e9ae61d0ce3f0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--43e2295d-72e2-48d2-8dc1-88daf5dcb92c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'd6f97c6dbe021f02adb2139fc990996ca0d670ceab0189017e69171298ea9c27']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bdd748a5-83e9-480b-9ce5-db7b7c427f32", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'd8ab0c6982ea7674ed4e53e4bfc7234a56b018090819b79f67a9cc6034fc98e2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4bbf331f-00df-4f27-9811-c077248ed1bc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'd931fe8da243e359e9e14f529eafe590b8c2dd1e76ca1ad833dd0f927648f88b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9fa0c03e-a6f9-492b-a41b-6485347f58dd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'd9dc572d6e446ec7629479eb60119b57a135e77aae22ea9f5a29a543af85b7da']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--227a591a-8e74-4e33-ba13-a29345146169", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'dd913d2b8a29eae792097e2d2b81a94e62b3e90636a9564f56dc302b50901ccb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--75f61a24-d88e-48c2-a25d-957c5fb1fa04", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:06.000Z", "modified": "2020-10-30T08:14:06.000Z", "pattern": "[file:hashes.SHA256 = 'dee7fbf9d55f5ed197463d65694accc6861a181248f3e79b99f5444183d39805']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:06Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a093f8b6-cfc8-4375-b2ff-9fed810c81fc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'e1e154590062bab331805d1657cbdea323053e25e0c5efe4a93d2deeca689452']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a8c6be4c-c8e4-4199-b07f-14b0f00ccbab", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'e5da410cbba9e76ea9510985653984b63e5af501a2e542c9c29def8c1ded23c3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--93022e25-6f85-48d1-9bf1-10d8fc7984ce", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'ede75c0a88d80043f79025dfd8ef91c3d1b01a1613f4a0347b2ceb29f8b19578']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1ad75d94-a808-47fc-ba9f-2e150f3ab485", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'eeadc13b1d59ada3851f56162796ef9d901a1fd74c457ced14d72b8df54e79ba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a8d7509a-2927-47bc-9fde-7b1c68ce020f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'f0bb1027787cd589b6c6ff6eba755d916f837d8753342f9ffa391fbbab718841']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ff3cd744-61d3-4131-80ba-d47200788fb3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'f20c78fb33d42d874ed6fdf7096a4dad9b3637e05ccc8ae52ee6cc4e5dd8a0bf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8cc815b7-8bc8-4c36-9199-992fd1e398fc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'f6b74d7a2b2e2c1f2b0f088c6b5cd7d26d4d40b756e76bcb7ad06cd7c6c17ded']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--01910748-31e6-4050-85c8-2e489664bc0b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'f6f3d1d060274e114c80bcd35c3f5e97909cf6ffd793bdab27d1eb913a0d391e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c9d1848d-7f37-4570-9b44-f8a9ef57b782", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'f7a66c1ed76f696c0d3d3d5c49e88b6cebf35ff232c5094d3284f7fe484a90a3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4153e52c-b69e-4422-9995-0491c7ee0819", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'f9507a76801d5b1b83704a5019cdc312de18b004f16c5547b91b7dba086b2e29']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--47edc405-c9ec-4a04-bddb-3f2ff0058af7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'f9c459824e223d5523ac6edfea7b842cf168ae135045258b04b4760f4002a86f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7fadd49d-41d2-42de-b185-0c8f2a7d5cea", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'f9c6dca22e336cf71ce4be540905b34b5a63a7d02eb9bbd8a40fc83e37154c22']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0dac7190-11b4-45f5-bde6-011011bbc46c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'fb780f623a78c9b5aa8a279430731b84d0efe937ea5684f80182e4f896e8e288']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--41d0d1c9-e028-4d1b-9973-fcfac8db0924", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'fec4655a9f99931692ecc28d35e2e17ae03f0acbfe8bdf9de00a05437049ce69']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--35e4b949-f5e6-4a14-8224-bc8ac205576f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'ff5e6fbf14c5eb35c1b4f24e4b08b30ba2e512a4b25ab7b652f0567edb94097e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--23d34b48-7a1f-4dac-a111-a7bfc1b240cc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:07.000Z", "modified": "2020-10-30T08:14:07.000Z", "pattern": "[file:hashes.SHA256 = 'ffd51f3de4ba08508ca7c19dd15676c2c8f4a61891c1dea297bb648633485bcd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:07Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Payload delivery" } ], "labels": [ "misp:type=\"sha256\"", "misp:category=\"Payload delivery\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--702b6c78-c785-4688-9182-b5e6ce8c54a5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '134.122.114.248']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--47e5cfae-9b6a-4576-a6f1-bd55c535bfd1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '142.93.122.23']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--858930eb-f5be-45a4-9828-5d5858006a5d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '149.28.215.46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e7aa22ef-3ad4-4e01-a1bd-66f483ef1bdb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '157.245.88.69']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a0893b92-97c0-477b-b0ff-6c73d42619f3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '159.89.53.108']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4f3b5b43-f563-456b-97bf-134bc94c2574", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '192.81.211.69']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--28621163-e20b-41d2-941b-891964d97783", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.252.246.185']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5c8e5497-79e3-4aad-95d9-2e4630052185", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.138.172.51']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3355fd17-d163-4f9a-9adf-9142e3ba6ec0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.141.86.136']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f44ec647-d38a-4d64-9d5f-5b80a0f095f0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.141.86.146']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e8e92754-db73-4cff-be00-473b00c8216d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.141.86.194']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--29e2f188-e39c-40fe-a872-dea94feb25fd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.141.86.207']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--47bb1cae-74ac-4632-a5d3-ad14198b4ac6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.147.228.77']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cde9c129-5080-4186-9f7c-2c3fd61528f6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.147.229.128']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--30697e86-d051-46d1-933c-5350160f0999", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.147.230.241']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--48569ca6-269d-4442-8086-dfafee3966a7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.147.230.30']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3e23aa03-95ec-4aed-886c-c40cd9e6b9c5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.32.134.62']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0ef68601-3d4f-450c-9845-62ec5d3fe2f9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.70.149']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d81912f7-0267-4577-8f3a-5cbea35289cb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '64.44.131.107']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8e804c75-4826-478f-9bba-8247f45448cb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.119.174.129']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0129bf9a-c122-429f-b25c-1f675562aa86", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.119.174.130']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--82760aae-1fa8-441e-bbde-e277e9d9be23", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.119.174.131']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c5bb800c-9b45-4d51-bc69-ce033752b6c2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.119.174.132']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b04af1fe-5278-4830-9606-c8231d0d3d22", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.119.175.237']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--94cd5094-7287-4a86-b1c9-17ff1fd7c3ff", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.177.12.161']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5c5808ce-abab-4b48-b487-26c94058fabf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '96.9.209.156']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b1a1028f-3500-43ee-9988-260790d4480a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '96.9.209.161']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a766c8f5-a1ce-40fd-864a-0a6dd86c3556", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '96.9.209.177']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9c76e32b-88f4-4943-b12d-d4cdda21a761", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:22.000Z", "modified": "2020-10-30T08:14:22.000Z", "pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '96.9.209.215']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"ip-dst\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b5914a21-282c-4ddc-8dd9-f95e393562b4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:47.000Z", "modified": "2020-10-30T08:14:47.000Z", "pattern": "[domain-name:value = 'ad.daemon-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0443c5b6-f385-4997-92e4-c8c02b7f276d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:47.000Z", "modified": "2020-10-30T08:14:47.000Z", "pattern": "[domain-name:value = 'as.raingamess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b57c9ea2-8748-47be-a7c0-8c1b13acbee5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:47.000Z", "modified": "2020-10-30T08:14:47.000Z", "pattern": "[domain-name:value = 'balanarr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5a1ba601-56fd-41f5-a51f-2f53769b702f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:47.000Z", "modified": "2020-10-30T08:14:47.000Z", "pattern": "[domain-name:value = 'bf.primeviref.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1b14ed33-34f6-43fb-ab57-ea021fdd533e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:47.000Z", "modified": "2020-10-30T08:14:47.000Z", "pattern": "[domain-name:value = 'bukaguka.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dc332d89-3e81-4d64-8f32-acc6b421d3c0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:47.000Z", "modified": "2020-10-30T08:14:47.000Z", "pattern": "[domain-name:value = 'bv.myobtain.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--90c31521-b6a5-4311-aed1-d98c30e8a86b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:47.000Z", "modified": "2020-10-30T08:14:47.000Z", "pattern": "[domain-name:value = 'cc.hotlable.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a79f1ede-a17e-4d7d-94a8-32e609c754c1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:47.000Z", "modified": "2020-10-30T08:14:47.000Z", "pattern": "[domain-name:value = 'cv.myobtain.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:47Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b89b1e70-6f4c-451f-9a35-093de1bf6042", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'cv.webxyz.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b9ba5105-b8df-4825-a5a6-3958b55f615c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'cx.hotlable.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6625e5cd-528d-4660-a437-4478044469e8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'cx.webxyz.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d2a9e2ad-61af-46b4-8aab-f08e1445bab9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'cz.webxyz.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--34852992-488f-4d64-8405-f76fa4993410", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'daemon-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5e6a7432-bcad-4a5d-9de0-8562cd07e3cb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'ea.daemon-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--16675d5a-d5c1-4f1d-b3fa-e819fecd16dd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'er.primeviref.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7ef71494-4ab3-4c65-96dd-35dd7c4d6e58", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'er.starcyclone.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5ea80a24-ac79-4c75-809c-946b03eb5ddd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'gg.raingamess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a1ce24ff-3506-4f7b-8bd0-01cadf3fc38a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'hotlable.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--710f297f-6060-48cb-b3c2-e08dba785e1c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'hunbabe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b8aef791-7f57-4a78-a443-590e3efc9ee9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'ju.daemon-update.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7916a9da-b207-4061-89e4-0daccca4da07", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'mn.balanarr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--259f72a0-4108-475e-a050-dedc086d4d0d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'mn.hunbabe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0a1a5d64-7019-4cad-87e8-b4180ba80081", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'myobtain.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--71e3bc9e-979a-44fa-9a40-3845fa661273", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'nasmasterservice.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--08b33068-32ba-4c1b-bc95-092c308c5b72", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'nm.hunbabe.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--60d4f133-53fc-401a-a5c4-a99d8edde86c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'nv.balanarr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--feb3c23d-431d-4e57-994b-fd960afe8742", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'po.starcyclone.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f2c02e43-6c2e-4d4f-afd9-6c5c8355d7de", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'primeviref.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9dc396b0-8482-4856-b7d4-2ef98cc07f78", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'qw.balanarr.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--20ebe5c9-06ca-467f-888d-4a6cdde5103c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'qw.raingamess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ab1e9441-e95c-49fa-8d4f-5b80710b30e1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'qw.servicemusthave.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--abedc7d3-adf4-44e3-b77e-3074a889c65a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'raingamess.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3bf5012c-38d6-4cc9-a91b-db48defbacd3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'rt.servicemusthave.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a02f09db-267a-4be1-95e0-4aeb2b3ff934", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'servicemusthave.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--047574f1-6ea1-4ebc-860a-cc2690f15aca", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'starcyclone.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--dc27706c-41f7-4b9c-8cce-33805b2b4102", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'toyotacamryy.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1949f9a0-b81f-4f53-8fd9-b2caa910876f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'tt.servicemusthave.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6084e4a1-ed44-4291-b52e-b7e658f4cd2d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'vc.myobtain.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3fc11220-b06a-4d00-adfe-51b2b8efd2b8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'we.primeviref.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--232f0f1b-279f-4b4c-807b-51438e657bf7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'webxyz.net']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"domain\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2c45f488-bf17-435e-bda0-39b4c3ba93d0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'xo.starcyclone.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--60e27794-2ea8-4b7d-b876-93c944692ff9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:14:48.000Z", "modified": "2020-10-30T08:14:48.000Z", "pattern": "[domain-name:value = 'xx.hotlable.com']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:14:48Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "Network activity" } ], "labels": [ "misp:type=\"hostname\"", "misp:category=\"Network activity\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--62d87168-ecd2-46aa-b749-057e78ef86fb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T07:37:17.000Z", "modified": "2020-10-30T07:37:17.000Z", "labels": [ "misp:name=\"report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "text", "object_relation": "summary", "value": "In service to the general public, RiskIQ is today releasing the entirety of its unique and expansive holdings relating to the Ryuk strain of ransomware, exposing all known infrastructure upon which the threat actors behind the attacks currently rely. Organizations will be able to use this intelligence to search their networks for signs of attack, as well as to prevent malicious connections to other Ryuk command-and-control servers.\r\nThe decision to release these indicators of compromise is meant to complement recent efforts made public by US federal agencies and researchers at FireEye, who have responded to a spate of reported attacks against hospitals around the country with alerts and intelligence designed to aid network defenders.\r\nAs cases of COVID-19 rise, news reports are warning that \u201cdozens\u201d of hospitals across the US have been targeted with the Ryuk strain of ransomware. The malware is thought to be deployed by Eastern European criminals and to be delivered by the same threat actors behind the Trickbot malware platform. Trickbot was the subject of a massive takedown attempt carried out by Microsoft earlier this month, reportedly in cooperation with US CYBERCOM.\r\nYesterday, federal agencies issued an alert aimed at the nation\u2019s healthcare industry, providing context on the Ryuk threat and releasing indicators of compromise. The alert was issued by the Federal Bureau of Investigation (FBI), the Department of Homeland Security\u2019s Cybersecurity & Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) in a joint advisory. The agencies also hosted a conference call for health care industry leaders to further advise them that ransomware attacks are actively targeting the industry, including hospital systems.\r\nIn addition to the government advisory, FireEye also publicly released all relevant Ryuk IOCs (https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html) it has observed in attacks against their customers in 2020.\r\nBelow, the public will find still more IOCs associated with Ryuk ransomware that RiskIQ has observed via its Global Internet Intelligence Graph. It has been organized in a way to include all IP addresses, domains, and SHA-256 samples we have identified, in addition to what has previously been released publicly. Users are encouraged to check back on this article daily, to keep up-to-date with the latest developments and intelligence on this threat.", "category": "Other", "uuid": "730a37c1-0bba-4be8-aa22-f75d0b321b38" } ], "x_misp_meta_category": "misc", "x_misp_name": "report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5e4b3ebd-ca0a-464f-ad10-70aea4b7ae7d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:13.000Z", "modified": "2020-10-30T08:56:13.000Z", "pattern": "[file:hashes.MD5 = '27197265ac57027fd51ee66fd401b882' AND file:hashes.SHA1 = '98920c69627c38787d08586c38268b945e4c9e6d' AND file:hashes.SHA256 = '6abf2716ace0464a488e5ed4d1935865d4d12886ff54fbb5dd659bf32f1cf23a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--00e2ce66-809e-426b-a464-03a3c73515af", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:13.000Z", "modified": "2020-10-30T08:56:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:43:54+00:00", "category": "Other", "uuid": "1dfc91ba-98f0-47ba-a32c-a14bc14eb870" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/6abf2716ace0464a488e5ed4d1935865d4d12886ff54fbb5dd659bf32f1cf23a/detection/f-6abf2716ace0464a488e5ed4d1935865d4d12886ff54fbb5dd659bf32f1cf23a-1604018634", "category": "Payload delivery", "uuid": "423fd4a4-d04c-429f-834f-d91e5c4b98d1" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "1d55864d-2658-4ade-82c6-02fcfe4b07f1" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ac882397-2143-439d-a35c-29d75328afc1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:13.000Z", "modified": "2020-10-30T08:56:13.000Z", "pattern": "[file:hashes.MD5 = '1c835dbc0454e448563c6fecb481250e' AND file:hashes.SHA1 = 'd3a5b3018962079ecd33c5d80c8dfc6b0a2aed61' AND file:hashes.SHA256 = '849c4687f36eecc3e3e5f68da5ee1b2b5c1fe75811db66633962af9a749ff355']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2fd08d36-d4b0-46d2-b04b-e73b5d0dab09", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:13.000Z", "modified": "2020-10-30T08:56:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:44:28+00:00", "category": "Other", "uuid": "13e8f75b-1bef-48b1-b273-825d5e80e83b" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/849c4687f36eecc3e3e5f68da5ee1b2b5c1fe75811db66633962af9a749ff355/detection/f-849c4687f36eecc3e3e5f68da5ee1b2b5c1fe75811db66633962af9a749ff355-1604018668", "category": "Payload delivery", "uuid": "344d9039-4052-492b-ba16-d346957405b3" }, { "type": "text", "object_relation": "detection-ratio", "value": "60/71", "category": "Payload delivery", "uuid": "efb7cc87-9392-427e-9017-2960a32c6f02" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6fd4b80d-ab64-4af1-a3a8-ad9b6d395c75", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:13.000Z", "modified": "2020-10-30T08:56:13.000Z", "pattern": "[file:hashes.MD5 = 'e83921068f58178919357d72f7da4b54' AND file:hashes.SHA1 = '4a0ba17833ebe3df630b45c6ee5175187a94a25c' AND file:hashes.SHA256 = 'b485bcb29c5bf53269960a243b051d4fafcd4ae2b17839e96afbf8f8fec8b244']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9b52878f-f520-4816-a7e5-7d612600a435", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:13.000Z", "modified": "2020-10-30T08:56:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-17T16:45:17+00:00", "category": "Other", "uuid": "2edf15bb-e87a-4070-ae0b-74a26a198bbf" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b485bcb29c5bf53269960a243b051d4fafcd4ae2b17839e96afbf8f8fec8b244/detection/f-b485bcb29c5bf53269960a243b051d4fafcd4ae2b17839e96afbf8f8fec8b244-1602953117", "category": "Payload delivery", "uuid": "5ffc849b-ca66-407e-adf3-f4167b38d1ad" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/70", "category": "Payload delivery", "uuid": "bef11a5d-e137-48a3-828d-175033ecf3bb" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b6522bbe-f37c-489b-8e4c-c2876a8dbbe4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:13.000Z", "modified": "2020-10-30T08:56:13.000Z", "pattern": "[file:hashes.MD5 = 'f0e418d8703c9fe05518526b5a110437' AND file:hashes.SHA1 = 'e0a1c2dc8bc85bbd54a68766e042e260a4aeaba9' AND file:hashes.SHA256 = '33a2b228186f8391a15442fc1333827fc2af5468c40d1a1552723245922a6812']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:13Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--529bb072-ec45-4bc8-9cbe-327e2a8c87fb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:13.000Z", "modified": "2020-10-30T08:56:13.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-19T04:38:37+00:00", "category": "Other", "uuid": "d0360e7e-3859-49a3-ab34-d7a7df69a4d3" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/33a2b228186f8391a15442fc1333827fc2af5468c40d1a1552723245922a6812/detection/f-33a2b228186f8391a15442fc1333827fc2af5468c40d1a1552723245922a6812-1603082317", "category": "Payload delivery", "uuid": "6b3e3d74-ef4e-4943-90ed-90b2b17defa5" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/59", "category": "Payload delivery", "uuid": "3065abd5-88a2-45aa-9356-0a9e94864d18" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3f2c3c0f-8e53-4526-97e6-2f13c526f330", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "pattern": "[file:hashes.MD5 = '8765876a56e35f4a21b7fac4792a4148' AND file:hashes.SHA1 = '07b332e50b279739189888048256c61725edb8a6' AND file:hashes.SHA256 = '1c1397233114820f366607896cb9f3d3d412270e79947ce1558fc8db7dcbb602']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--576829d7-5640-4605-910e-d1d6874e0686", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-29T20:07:41+00:00", "category": "Other", "uuid": "dac1c416-5be3-40e8-ae5d-ecf1f821de38" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/1c1397233114820f366607896cb9f3d3d412270e79947ce1558fc8db7dcbb602/detection/f-1c1397233114820f366607896cb9f3d3d412270e79947ce1558fc8db7dcbb602-1604002061", "category": "Payload delivery", "uuid": "1ce8067b-5821-4eec-8a00-edeae2da5559" }, { "type": "text", "object_relation": "detection-ratio", "value": "42/71", "category": "Payload delivery", "uuid": "f8e804e4-d702-498f-ba52-0bf25dfdaee5" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--908358ba-5ed0-4297-b786-12a4289242f8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "pattern": "[file:hashes.MD5 = '2b14db199e034461e2302c90d61b0e1a' AND file:hashes.SHA1 = '49131ff6a3cfcb5d95b2fa8f15d4ecb27380682a' AND file:hashes.SHA256 = 'eeadc13b1d59ada3851f56162796ef9d901a1fd74c457ced14d72b8df54e79ba']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b43ea474-a729-4dfd-9e40-0822f358eb91", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-29T07:38:20+00:00", "category": "Other", "uuid": "886a5d70-9d35-4ec2-97ae-20f359a3acd3" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/eeadc13b1d59ada3851f56162796ef9d901a1fd74c457ced14d72b8df54e79ba/detection/f-eeadc13b1d59ada3851f56162796ef9d901a1fd74c457ced14d72b8df54e79ba-1603957100", "category": "Payload delivery", "uuid": "7e156070-65e5-44f7-ab28-c804720047f9" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/69", "category": "Payload delivery", "uuid": "dbb67355-b864-4703-9f89-e2f9bcecced9" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ead61ca6-0171-45e8-866e-d771f0dff221", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "pattern": "[file:hashes.MD5 = '12963009969137f99d02129f98465975' AND file:hashes.SHA1 = '5a2fbefccac3bcf330ed6f5c57372e5056817094' AND file:hashes.SHA256 = 'c0595bfea597e67c4e7291e60ed124c5b6fd47eca5d2a2dee4ac61864ac6dc5f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--75db51bf-03f3-48b7-b91e-a61105c01f5e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:50+00:00", "category": "Other", "uuid": "3f9038c4-b9e5-496a-9224-a213067fbd1e" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/c0595bfea597e67c4e7291e60ed124c5b6fd47eca5d2a2dee4ac61864ac6dc5f/detection/f-c0595bfea597e67c4e7291e60ed124c5b6fd47eca5d2a2dee4ac61864ac6dc5f-1604018930", "category": "Payload delivery", "uuid": "6060f3eb-ffbd-4b85-a1e4-5771b50cd36c" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "905e21fa-6ed7-4aa7-bf89-6879afc961d5" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d29baa9f-3cb5-417d-8a99-0036be91261f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "pattern": "[file:hashes.MD5 = '8eef3411f7938ddae15cfba34807d33f' AND file:hashes.SHA1 = '8a96fc4090eb2719504abac1e11a40cda0ab2d1d' AND file:hashes.SHA256 = '82ccc3e53246b4b931c7d6642b70de245d9896b6481b273ee50aca3c58614027']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--72cae686-0ad4-42f7-938e-640b8cf6c173", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:44:21+00:00", "category": "Other", "uuid": "d7ea2627-fe9d-476a-9273-f1231b17fb34" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/82ccc3e53246b4b931c7d6642b70de245d9896b6481b273ee50aca3c58614027/detection/f-82ccc3e53246b4b931c7d6642b70de245d9896b6481b273ee50aca3c58614027-1604018661", "category": "Payload delivery", "uuid": "3e4c869f-83cc-495d-ad39-5580a36d0465" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/71", "category": "Payload delivery", "uuid": "ba7318e3-e60e-40dd-bbb2-7df90104a41f" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b1f6ca3d-e038-406a-84a1-16f010a477fb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "pattern": "[file:hashes.MD5 = '5c1fce8fa3e228b8f2641bb1f7a29c3f' AND file:hashes.SHA1 = '29234654f799ff6ea89fada6af32763c02fff1eb' AND file:hashes.SHA256 = '991a222bdbeb5d25b9f9445496112af904ac7b677b6296810727e6e403f5f5eb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7449d241-4e95-4a07-b3d4-e5aaf770bf80", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-14T13:50:13+00:00", "category": "Other", "uuid": "371eac32-7a01-4b21-aa99-9c211d26e69a" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/991a222bdbeb5d25b9f9445496112af904ac7b677b6296810727e6e403f5f5eb/detection/f-991a222bdbeb5d25b9f9445496112af904ac7b677b6296810727e6e403f5f5eb-1602683413", "category": "Payload delivery", "uuid": "98782b08-3cb9-4519-bacf-cc0f79370fa5" }, { "type": "text", "object_relation": "detection-ratio", "value": "39/69", "category": "Payload delivery", "uuid": "1ad9a3e3-ec87-419d-bbbd-2bb9a2e3e4cc" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--63c96554-bdeb-460e-a6fc-f34d987c6f9a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "pattern": "[file:hashes.MD5 = 'cfe3c64842d025295eeda7b6ab470d89' AND file:hashes.SHA1 = '9be1e7531ab8f274f8fec3d56508f064dae91468' AND file:hashes.SHA256 = 'ceb4bfe175798179b0947da1ffd8eda13777b9d7b02bc75599b6f6907cf2c2c0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fc3eeb39-1a76-4f90-b349-5b18765ffbc6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:49:06+00:00", "category": "Other", "uuid": "ccd64e68-9210-468b-824b-c67743d4c0c8" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/ceb4bfe175798179b0947da1ffd8eda13777b9d7b02bc75599b6f6907cf2c2c0/detection/f-ceb4bfe175798179b0947da1ffd8eda13777b9d7b02bc75599b6f6907cf2c2c0-1604018946", "category": "Payload delivery", "uuid": "c0900208-909a-4f1a-b796-068450e90c98" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/72", "category": "Payload delivery", "uuid": "1a4f0f04-9c4a-42b4-a8ef-493c5696ed0e" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7cc421fe-a7f7-4ce1-8350-e097b2d323a4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "pattern": "[file:hashes.MD5 = '45ed8898bead32070cf1eb25640b414c' AND file:hashes.SHA1 = 'dd77cee3d418a6462b2e31fabc76510b8f2320d5' AND file:hashes.SHA256 = '836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8007aa8a-ca37-4ade-927f-5a18d2494e6c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-25T10:53:30+00:00", "category": "Other", "uuid": "48e8ad8d-5ac9-4216-92ad-6cfde0859a04" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599/detection/f-836db6bde6f664fa42b020c7b4549713022eac87410c1ed1104b6d4df615a599-1603623210", "category": "Payload delivery", "uuid": "b91ef160-3a78-42b8-a9bd-79c2deda76cd" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/60", "category": "Payload delivery", "uuid": "17cdd15b-0a53-4c60-928e-79d700a670e6" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--88bb68aa-24a7-43b4-aa66-2664b2d7a6fe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "pattern": "[file:hashes.MD5 = '6c4dacbefca90dad7ef318604e635e89' AND file:hashes.SHA1 = '5810d3a052d459760defbf479be15df1eebff48f' AND file:hashes.SHA256 = '1c05380af47696f7d7ef84b452fa4f662158d9f1caf7ad01a455061081d13653']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4deb19ef-d3a2-469c-8867-ec0068cdecd0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-27T08:46:00+00:00", "category": "Other", "uuid": "b6047dc1-e4ec-42cf-8a21-83ef4dd14dfb" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/1c05380af47696f7d7ef84b452fa4f662158d9f1caf7ad01a455061081d13653/detection/f-1c05380af47696f7d7ef84b452fa4f662158d9f1caf7ad01a455061081d13653-1603788360", "category": "Payload delivery", "uuid": "19ddb205-c2d4-45a9-86f5-b7c7ea2a6dbf" }, { "type": "text", "object_relation": "detection-ratio", "value": "21/64", "category": "Payload delivery", "uuid": "2d846543-7036-4739-bde0-5384d0c6862c" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--87954ab5-4409-4ea3-94f8-165babf4c710", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "pattern": "[file:hashes.MD5 = '7787793cbd6267fd2b90d959bf332bf4' AND file:hashes.SHA1 = '2e563c126e52fea3e2dc6ae7cb3e61d0ff00f65b' AND file:hashes.SHA256 = '68547344839166ef8e28dd31b40b35d94759eda2949eab654bf737dfe9d3edae']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--088808e2-c340-49e6-96a5-9b0bc41b85c4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-03-03T14:58:16+00:00", "category": "Other", "uuid": "c02e3e5a-7dbd-4966-bba3-0a2f9d7807d7" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/68547344839166ef8e28dd31b40b35d94759eda2949eab654bf737dfe9d3edae/detection/f-68547344839166ef8e28dd31b40b35d94759eda2949eab654bf737dfe9d3edae-1583247496", "category": "Payload delivery", "uuid": "0086255f-45f8-4e5e-a8b0-127db41cac66" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/69", "category": "Payload delivery", "uuid": "c05d9519-2f1b-4579-af41-e30957c0ff8e" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2a2dd0a7-5011-4981-9b67-f02c12b8f45e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:14.000Z", "modified": "2020-10-30T08:56:14.000Z", "pattern": "[file:hashes.MD5 = 'bee5e78994ab779ebc2419af945d41bd' AND file:hashes.SHA1 = 'e51c0e251dd24eb2aa561f1e0b01fab249674b53' AND file:hashes.SHA256 = '956cd22a033de80926083810a0946ad764e0df61dfc0ad09af5e1947327281c9']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:14Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--31caa127-b831-4dba-a175-597008420dfd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:47:39+00:00", "category": "Other", "uuid": "13a774b8-0fe4-4d5b-bd62-22ddb97585e3" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/956cd22a033de80926083810a0946ad764e0df61dfc0ad09af5e1947327281c9/detection/f-956cd22a033de80926083810a0946ad764e0df61dfc0ad09af5e1947327281c9-1604018859", "category": "Payload delivery", "uuid": "71c21224-1315-4446-9cbb-3dbb0ac083bd" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "076cb55f-71e5-4843-ac9b-da129e7f5cbb" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8bb6b5f9-1eec-437c-b4e4-9f383f4cda2c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "pattern": "[file:hashes.MD5 = 'a8ed5d85a362e3593a5c2e811ef705d1' AND file:hashes.SHA1 = '10f70fcc77e24a44601194f2aefc2477106bba17' AND file:hashes.SHA256 = '71fe1f1ce713e265b2c6693f83ed94a359e43e6aa60322baee599ba74a2f2ac0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c14b090b-a2e7-4aa9-88dc-22ce1ec164f5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-06T01:52:28+00:00", "category": "Other", "uuid": "ca7c3792-8d4a-44be-9417-57f031ca2e75" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/71fe1f1ce713e265b2c6693f83ed94a359e43e6aa60322baee599ba74a2f2ac0/detection/f-71fe1f1ce713e265b2c6693f83ed94a359e43e6aa60322baee599ba74a2f2ac0-1601949148", "category": "Payload delivery", "uuid": "e32403e4-8c8b-437b-bcff-908bf9ecb27f" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/70", "category": "Payload delivery", "uuid": "7e2a64c1-2d3f-4e69-9349-6f5195238bfe" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ad88c285-5054-45f9-ace8-cdcfa5353a47", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "pattern": "[file:hashes.MD5 = '8f044ca3d947bacaa6eb3102d002b10a' AND file:hashes.SHA1 = '9a454f50ec48736a36cf6e317dae93330ca2279a' AND file:hashes.SHA256 = 'ca4963745454cc8584cec4e53d27d78c86a4766a4f69b0b37617efcd915621c8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a5bb37a9-4148-4e6d-af0a-9f0236e9081c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:58+00:00", "category": "Other", "uuid": "80a0277c-c012-4ac4-bdb5-6b056ff577d8" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/ca4963745454cc8584cec4e53d27d78c86a4766a4f69b0b37617efcd915621c8/detection/f-ca4963745454cc8584cec4e53d27d78c86a4766a4f69b0b37617efcd915621c8-1604018938", "category": "Payload delivery", "uuid": "18d87866-da97-49cb-8b71-cdde168bd4c7" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/72", "category": "Payload delivery", "uuid": "ba2073ee-1ef0-4d38-b3b0-b3f989437158" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c2cc0844-2ef9-4a4f-8073-8d562ec641b4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "pattern": "[file:hashes.MD5 = '5628e7821300674c1d2d197c36ae27de' AND file:hashes.SHA1 = '3b48dcb3c2c812c595531b71a686c12d3a568a5a' AND file:hashes.SHA256 = '7f901d8f673d5e1fde07676b3287aa9a24dc92fb48e7ca82a163e0b0581ee7ad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2e469fab-9d51-49a5-8853-f1d932426d8e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-18T06:57:45+00:00", "category": "Other", "uuid": "5503d3b5-e4e9-40d0-97d9-7c1d182d084c" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/7f901d8f673d5e1fde07676b3287aa9a24dc92fb48e7ca82a163e0b0581ee7ad/detection/f-7f901d8f673d5e1fde07676b3287aa9a24dc92fb48e7ca82a163e0b0581ee7ad-1603004265", "category": "Payload delivery", "uuid": "ab037109-c5d6-40c8-a459-baa3d2071072" }, { "type": "text", "object_relation": "detection-ratio", "value": "60/71", "category": "Payload delivery", "uuid": "e2a3eecc-d632-484b-ad02-a4b79dccb224" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c0afae13-062d-49a7-a713-9a51b448b3a9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "pattern": "[file:hashes.MD5 = '54bd58f706c85cfbb0f79b93a1ef5647' AND file:hashes.SHA1 = 'be1d0d758a601b28fe3e4b9ee89c11bb4efd714a' AND file:hashes.SHA256 = '31e9c92d7dce8b65dded9c40e67d9cfca33bf8870d460e73b02df8a035ca719f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d578e159-ed9c-4d51-b571-5222bd7c89b9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-15T05:04:41+00:00", "category": "Other", "uuid": "fc33538d-1b12-4e89-b31f-38dee195406e" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/31e9c92d7dce8b65dded9c40e67d9cfca33bf8870d460e73b02df8a035ca719f/detection/f-31e9c92d7dce8b65dded9c40e67d9cfca33bf8870d460e73b02df8a035ca719f-1602738281", "category": "Payload delivery", "uuid": "7b00b926-e966-44e2-8889-362205ae50bb" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/71", "category": "Payload delivery", "uuid": "e7e3daa1-8f49-44f0-a3f1-05a3a3700692" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d024baa3-1fec-4c1a-8553-0e6f98f25421", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "pattern": "[file:hashes.MD5 = '52fd3e86aad283c1958c2babbba5d0bc' AND file:hashes.SHA1 = 'ed235c4335d0e5791ae2d183e2e41e4ec33ca769' AND file:hashes.SHA256 = '7c64c488a58473d9456d4f2f64b7bcb5eea03c32bd99650c59e38b0993eba7b3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--313aaa43-c6cf-4b04-bbd2-2445367ac02c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:44:18+00:00", "category": "Other", "uuid": "25c17078-8d97-4cd1-8d1d-2cb8a0353988" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/7c64c488a58473d9456d4f2f64b7bcb5eea03c32bd99650c59e38b0993eba7b3/detection/f-7c64c488a58473d9456d4f2f64b7bcb5eea03c32bd99650c59e38b0993eba7b3-1604018658", "category": "Payload delivery", "uuid": "b03c5cba-5200-40f6-8eb7-02f44ca96b76" }, { "type": "text", "object_relation": "detection-ratio", "value": "61/72", "category": "Payload delivery", "uuid": "f37f7338-d308-462d-bfa3-95039c416bba" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--26310581-f95c-4206-abc1-7bf5c0a488ac", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "pattern": "[file:hashes.MD5 = '51f052e28e66fc3735dd2977680bccf1' AND file:hashes.SHA1 = '1ae29d6fd93da47903fd001e83b39919698c258a' AND file:hashes.SHA256 = '2a2e39586e7232a3339d52453b477454bc44b6305c711dd9eb5ecf4394c55b10']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--798d4c42-9a74-4124-9c97-4d480a05aec4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:45+00:00", "category": "Other", "uuid": "c6cfbf69-23b7-4400-81a3-e0f6dcebba5c" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/2a2e39586e7232a3339d52453b477454bc44b6305c711dd9eb5ecf4394c55b10/detection/f-2a2e39586e7232a3339d52453b477454bc44b6305c711dd9eb5ecf4394c55b10-1604018565", "category": "Payload delivery", "uuid": "ac4f2d3a-0c28-4034-aef9-b66b233a1ba5" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "8f6249f0-08f0-4386-93c3-f8e7f71d2b6a" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e8b4a663-ff85-43cb-8398-8f1fbbc197cf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "pattern": "[file:hashes.MD5 = '5830d56abdd025531c75081a591cd65c' AND file:hashes.SHA1 = 'c508aef5aed97581b724999797659e695e1ea25a' AND file:hashes.SHA256 = '42d914b10255499859ee5919b183ca521ae483ac3edc2f1653d52487f9098342']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--55b4925d-4e59-40cf-918c-5cdf333dacfb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-09-10T22:43:11+00:00", "category": "Other", "uuid": "cca767bd-c4e1-42dc-81dd-b7983eaaf19b" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/42d914b10255499859ee5919b183ca521ae483ac3edc2f1653d52487f9098342/detection/f-42d914b10255499859ee5919b183ca521ae483ac3edc2f1653d52487f9098342-1599777791", "category": "Payload delivery", "uuid": "b958872c-ba36-46ac-9ce8-73c5232fdf49" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/68", "category": "Payload delivery", "uuid": "4ee86566-a988-4eea-a649-b857f235f1f0" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ac1d0ce6-08f6-4b69-8614-6ab3044ecc44", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "pattern": "[file:hashes.MD5 = 'ae273a9fcffc596bd3590e25358df530' AND file:hashes.SHA1 = '3b08a9eb4d3e9d0117d47e8d17dd59651f40855f' AND file:hashes.SHA256 = '8074bbc62a36ff2c0037634d3c45fdf40bfc372a7123f64c38f159c04d2391c6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7ceb59f0-3fa1-43ec-aeb8-16a783f01fe3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:44:19+00:00", "category": "Other", "uuid": "7d99d950-1776-4171-95c9-07a168da0eae" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/8074bbc62a36ff2c0037634d3c45fdf40bfc372a7123f64c38f159c04d2391c6/detection/f-8074bbc62a36ff2c0037634d3c45fdf40bfc372a7123f64c38f159c04d2391c6-1604018659", "category": "Payload delivery", "uuid": "91aec557-872c-4c30-96cb-81488d493945" }, { "type": "text", "object_relation": "detection-ratio", "value": "60/72", "category": "Payload delivery", "uuid": "bed5bf59-4422-4bcc-99e0-c7fe226bdb4c" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e1ca9c54-2ce8-44bb-bfca-350de81502ba", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "pattern": "[file:hashes.MD5 = '338f61ec72842816598ad2e4119898db' AND file:hashes.SHA1 = '76e509a899030337e6e34c0b6fa420b6b6201ec3' AND file:hashes.SHA256 = '959e289a72a49a27d173d5c020969e27aa078a1521b3632ceb5e8c77fa01a342']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:15Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--aa951bc9-ef07-4251-aa0f-4538eee478de", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:15.000Z", "modified": "2020-10-30T08:56:15.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:47:41+00:00", "category": "Other", "uuid": "1d468b29-f437-475a-9eff-8c794c1971dd" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/959e289a72a49a27d173d5c020969e27aa078a1521b3632ceb5e8c77fa01a342/detection/f-959e289a72a49a27d173d5c020969e27aa078a1521b3632ceb5e8c77fa01a342-1604018861", "category": "Payload delivery", "uuid": "c3bd2c20-7967-4a0f-8351-f904c90cd95b" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/70", "category": "Payload delivery", "uuid": "0980d278-861c-47e6-b560-d446580a4ff7" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--6fc8fff8-49cf-4081-a039-736633c0ed58", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "pattern": "[file:hashes.MD5 = 'f9bef2eb1093eede8045e9dc61ba3939' AND file:hashes.SHA1 = '0c2f2c04650b744bbb772bbdf5633f33b3f71e36' AND file:hashes.SHA256 = 'cb039efaebc29c1cc5c0fcf8567de534993f447245a45db03c927af56f7096d7']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--383142fa-6e3a-4f81-9235-567eeb5b0ab6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:49:04+00:00", "category": "Other", "uuid": "a062c9d3-7ead-448b-b064-ef67e0f432cf" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/cb039efaebc29c1cc5c0fcf8567de534993f447245a45db03c927af56f7096d7/detection/f-cb039efaebc29c1cc5c0fcf8567de534993f447245a45db03c927af56f7096d7-1604018944", "category": "Payload delivery", "uuid": "8439f342-9226-4652-8931-947b4b9d421e" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/72", "category": "Payload delivery", "uuid": "8bc07bbc-b914-4852-9d8e-ce77c21b474e" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3481a175-cb01-4840-9abe-cbd87234807a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "pattern": "[file:hashes.MD5 = '8a07acd8c2a5a00df18315f76b1b2667' AND file:hashes.SHA1 = '3f82b5a53429ae95dce9a9b2f88f6635e08128ff' AND file:hashes.SHA256 = 'dee7fbf9d55f5ed197463d65694accc6861a181248f3e79b99f5444183d39805']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8e613b40-bd32-45a9-93f9-f3339ef5265a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-29T09:53:21+00:00", "category": "Other", "uuid": "d9272af9-92a8-46ca-8dd4-6a48d3bbeb7c" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/dee7fbf9d55f5ed197463d65694accc6861a181248f3e79b99f5444183d39805/detection/f-dee7fbf9d55f5ed197463d65694accc6861a181248f3e79b99f5444183d39805-1603965201", "category": "Payload delivery", "uuid": "744bc77a-f620-4fad-9468-315d778f2d2e" }, { "type": "text", "object_relation": "detection-ratio", "value": "51/71", "category": "Payload delivery", "uuid": "214bb321-0783-4159-8c57-1737686e182c" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ee57c4f1-12e8-4d02-9d9b-7aff080fb603", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "pattern": "[file:hashes.MD5 = 'c6baec0946bf6ccde48a0413a9c49c1b' AND file:hashes.SHA1 = '277410845de23288c4aa12507ce264d88874aa63' AND file:hashes.SHA256 = '087d2b51bec315fdbd938405c9cdcdf63f0d0bda42c7db89062ef3cccc45b525']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--09432c45-43fc-42cd-be4f-dadab4fedd84", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:41:55+00:00", "category": "Other", "uuid": "f5d393fb-0d72-44f1-bc09-62153b3be469" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/087d2b51bec315fdbd938405c9cdcdf63f0d0bda42c7db89062ef3cccc45b525/detection/f-087d2b51bec315fdbd938405c9cdcdf63f0d0bda42c7db89062ef3cccc45b525-1604018515", "category": "Payload delivery", "uuid": "56410225-5040-4a54-9998-5579ae6c6306" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/71", "category": "Payload delivery", "uuid": "d1a52f48-fa0f-4ccd-ac12-1318997a5cad" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b78c654a-eb99-40d0-8b4f-598364a838d0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "pattern": "[file:hashes.MD5 = '6b657b9e2aee50530ac89f7a1a970695' AND file:hashes.SHA1 = 'b82bc4fdf974cbda29193f63c8a04ea35cef3129' AND file:hashes.SHA256 = '641a07800e1e9542d0756a7bb740f80ec49aed633af0add108a6e00671e10757']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b9366adb-2b69-4fa3-9d43-aa29ebe4b2cd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:43:46+00:00", "category": "Other", "uuid": "2bd8a028-c314-4446-832d-fe5bad4cca4b" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/641a07800e1e9542d0756a7bb740f80ec49aed633af0add108a6e00671e10757/detection/f-641a07800e1e9542d0756a7bb740f80ec49aed633af0add108a6e00671e10757-1604018626", "category": "Payload delivery", "uuid": "a594c2da-789f-47b8-95c1-813a48e82b9d" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/72", "category": "Payload delivery", "uuid": "cb24ce39-4522-4ff4-9deb-cdaf4dccc18a" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2a3fb881-8056-4765-aa9a-27a80acc6bf2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "pattern": "[file:hashes.MD5 = 'f11a64a174727afd094940241b337d06' AND file:hashes.SHA1 = '252699f458ebca8f86ee784d2bada1a183f8e482' AND file:hashes.SHA256 = '243408d1fa0c8a7a778d8bb224532c649409d0db76fc0ca2be385d193da22b1e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4bd2979b-dbc0-40c3-9479-14121d9d47c7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-05-29T08:05:35+00:00", "category": "Other", "uuid": "2dd8b90a-cd25-4468-9525-508b11626f29" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/243408d1fa0c8a7a778d8bb224532c649409d0db76fc0ca2be385d193da22b1e/detection/f-243408d1fa0c8a7a778d8bb224532c649409d0db76fc0ca2be385d193da22b1e-1590739535", "category": "Payload delivery", "uuid": "d829e613-9ca2-4103-aac0-7cb1c863e8d2" }, { "type": "text", "object_relation": "detection-ratio", "value": "4/58", "category": "Payload delivery", "uuid": "4c6179c7-5232-4046-ba23-c9cd02165f6d" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--aef19916-9097-40ef-a7d3-243415f3d0d8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "pattern": "[file:hashes.MD5 = '63f6b2067577f2ed002eb2bd1dd51238' AND file:hashes.SHA1 = '9087c9b5b704145db9cbc0b806300f9ff94b0a27' AND file:hashes.SHA256 = '2dcb2f1fe7fc145529c31328c150cd9a00a8b02e57a69f09211db334f78fe784']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2b85fa93-dc70-4992-81eb-df1175ee277e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-13T05:41:52+00:00", "category": "Other", "uuid": "66d7ebc3-44b5-46cb-a3aa-feea8257ae63" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/2dcb2f1fe7fc145529c31328c150cd9a00a8b02e57a69f09211db334f78fe784/detection/f-2dcb2f1fe7fc145529c31328c150cd9a00a8b02e57a69f09211db334f78fe784-1602567712", "category": "Payload delivery", "uuid": "e23c25c2-9e88-4cb0-a944-721f311315f9" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/69", "category": "Payload delivery", "uuid": "ba628f14-6bed-462b-b8fe-0f7971307a6d" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--cd330673-923f-4a4b-8ceb-46b108f3e454", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "pattern": "[file:hashes.MD5 = '120cf4d1f8e624642afa69869ae1af6b' AND file:hashes.SHA1 = '5137162d579ffdb90013b212f7655f74d7d8cc64' AND file:hashes.SHA256 = 'ff5e6fbf14c5eb35c1b4f24e4b08b30ba2e512a4b25ab7b652f0567edb94097e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e2c9a6cc-d8c4-4f67-8c61-5d407dcbba9a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-17T15:26:19+00:00", "category": "Other", "uuid": "6e84ada4-b972-4764-a962-1ca023c89d48" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/ff5e6fbf14c5eb35c1b4f24e4b08b30ba2e512a4b25ab7b652f0567edb94097e/detection/f-ff5e6fbf14c5eb35c1b4f24e4b08b30ba2e512a4b25ab7b652f0567edb94097e-1602948379", "category": "Payload delivery", "uuid": "88b2e4a7-4aef-4320-8283-0aec5a8f9bba" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Payload delivery", "uuid": "ad262e62-5f2f-4486-ab72-71261e6b7414" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0de8f154-20b4-4cbb-bff4-8387a4018315", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "pattern": "[file:hashes.MD5 = '9e4b4cb4f9a898c267597feac791dbdd' AND file:hashes.SHA1 = 'fff33ee129006a824955f2704ff288d97dace950' AND file:hashes.SHA256 = '24e8413c8743a2349be66e1df415f8e8c8326b3e9fb8b4f158f8fde4409626af']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--176ed5ae-6f90-4672-9199-96121aaf2700", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:39+00:00", "category": "Other", "uuid": "7a624ea1-5fb1-4607-b95f-b5253d8e7b2b" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/24e8413c8743a2349be66e1df415f8e8c8326b3e9fb8b4f158f8fde4409626af/detection/f-24e8413c8743a2349be66e1df415f8e8c8326b3e9fb8b4f158f8fde4409626af-1604018559", "category": "Payload delivery", "uuid": "06fb9cdb-c9d9-4277-b623-37e3313d87c7" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/68", "category": "Payload delivery", "uuid": "dc6db485-b10a-4218-8de7-1a72cd8f04f6" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7648e2bb-97f3-4136-8638-19438312c1f0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:16.000Z", "modified": "2020-10-30T08:56:16.000Z", "pattern": "[file:hashes.MD5 = '9143d36eb003675f475253b58a551fe9' AND file:hashes.SHA1 = '37d90ecaf4c83fde3bcf0cafe5ed67f88c1bfaca' AND file:hashes.SHA256 = '57b75ed78a4b94749fe25b14e7a6e3b357089b060b88aeb7a30144c6713e5afc']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:16Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bb073d81-1582-4442-96c3-3154f7c5175a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-08-31T07:23:50+00:00", "category": "Other", "uuid": "58c5e97e-1f64-4825-a8f9-4e1c546ba11d" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/57b75ed78a4b94749fe25b14e7a6e3b357089b060b88aeb7a30144c6713e5afc/detection/f-57b75ed78a4b94749fe25b14e7a6e3b357089b060b88aeb7a30144c6713e5afc-1598858630", "category": "Payload delivery", "uuid": "a4e829eb-4907-4f49-af82-c0738efc4516" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/68", "category": "Payload delivery", "uuid": "3248870e-d3d1-42ef-8543-0c44975f1de2" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f3f44c88-aac0-4659-ba55-ec85914a6a43", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "pattern": "[file:hashes.MD5 = '50dd30bc1cca41ed34143287247e668e' AND file:hashes.SHA1 = 'f1248a89ee385a6f4fc6195a83c91870b5f600a4' AND file:hashes.SHA256 = '1dae20a13c71c11f3c2a2010d2577cd2b3601c1092a980c1305991681b178c46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--223881fc-7e22-4e6e-8e2e-5ef678fe01fa", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-12T04:17:44+00:00", "category": "Other", "uuid": "02591bd8-73b6-4fdb-93d4-7ebaf0cb3f92" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/1dae20a13c71c11f3c2a2010d2577cd2b3601c1092a980c1305991681b178c46/detection/f-1dae20a13c71c11f3c2a2010d2577cd2b3601c1092a980c1305991681b178c46-1602476264", "category": "Payload delivery", "uuid": "6f9be60c-2fc7-454b-9d6b-13f01dee4d85" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/70", "category": "Payload delivery", "uuid": "9a646a0c-be9d-45f2-b095-e0d89d985448" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d96379c5-a04f-450d-a1fa-5130b7a9cb47", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "pattern": "[file:hashes.MD5 = 'b17a9f6d1916471dc4862aee9a76c26a' AND file:hashes.SHA1 = '2a92911b56f79bddeb6cb8b7869acb7ab9370b5e' AND file:hashes.SHA256 = '151983eab306e5fcd22b110cf36ddc2357564d40399d08ce8a70d7f78b0bfbbf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1a591c5c-22e2-4927-b929-cd9648cce64f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-06T20:56:53+00:00", "category": "Other", "uuid": "fd42f2ba-e93c-48af-ae88-bf0dcc7fbe59" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/151983eab306e5fcd22b110cf36ddc2357564d40399d08ce8a70d7f78b0bfbbf/detection/f-151983eab306e5fcd22b110cf36ddc2357564d40399d08ce8a70d7f78b0bfbbf-1602017813", "category": "Payload delivery", "uuid": "193cc6c0-3252-4f88-badf-620984ef8643" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/69", "category": "Payload delivery", "uuid": "1fbef84f-f595-4842-8121-5ec58f592443" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a18de543-51a8-473e-bce8-8bd40a06da42", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "pattern": "[file:hashes.MD5 = '442b0435ef029da1e47e9cf08c333e7c' AND file:hashes.SHA1 = 'b5bb04e2d7e5f931fd56e82f95f6cfed7c02dffc' AND file:hashes.SHA256 = 'fec4655a9f99931692ecc28d35e2e17ae03f0acbfe8bdf9de00a05437049ce69']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--41054227-3150-48aa-9ff9-e4107aead60e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:50:07+00:00", "category": "Other", "uuid": "f47c866f-1b46-47af-8cc9-ef5d2165f551" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/fec4655a9f99931692ecc28d35e2e17ae03f0acbfe8bdf9de00a05437049ce69/detection/f-fec4655a9f99931692ecc28d35e2e17ae03f0acbfe8bdf9de00a05437049ce69-1604019007", "category": "Payload delivery", "uuid": "f09b880b-4ae9-4f2a-8d7b-f32a100ae0c0" }, { "type": "text", "object_relation": "detection-ratio", "value": "45/72", "category": "Payload delivery", "uuid": "3784340f-31d5-4a9d-b316-b4253333e004" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--57592eb5-8a8b-469e-bf60-91c626a922a2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "pattern": "[file:hashes.MD5 = '553a3cbe0b19e58c5d48e9b0396690bf' AND file:hashes.SHA1 = '15bafbd10d9bb078839da143510aacd540fab480' AND file:hashes.SHA256 = 'c9b06152ac1c851eaed84ee052c374341ed89d9a6e5a5d97bd0e4b941c01a274']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--71ba1cdd-c76a-4bad-98db-d57286d9b019", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-16T14:44:27+00:00", "category": "Other", "uuid": "8aa819eb-dd99-4496-95f6-a9d71125c059" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/c9b06152ac1c851eaed84ee052c374341ed89d9a6e5a5d97bd0e4b941c01a274/detection/f-c9b06152ac1c851eaed84ee052c374341ed89d9a6e5a5d97bd0e4b941c01a274-1602859467", "category": "Payload delivery", "uuid": "5d636736-3253-4015-8b02-0ea8152edae2" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/68", "category": "Payload delivery", "uuid": "54489666-b82d-4c00-87b0-09fda419bee3" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--efafad91-2966-44fa-8c60-ddae7045e5d7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "pattern": "[file:hashes.MD5 = 'd301bb6e5b1b3a82fab6fbd06f34869f' AND file:hashes.SHA1 = '3a4842cca5746e37998d3067e2366fe9a0f91265' AND file:hashes.SHA256 = 'f0bb1027787cd589b6c6ff6eba755d916f837d8753342f9ffa391fbbab718841']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7bd9928c-6e1b-442f-a824-4e2734b88c6b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:49:37+00:00", "category": "Other", "uuid": "76cc4d4d-02e9-4b98-be83-79b70852e6da" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/f0bb1027787cd589b6c6ff6eba755d916f837d8753342f9ffa391fbbab718841/detection/f-f0bb1027787cd589b6c6ff6eba755d916f837d8753342f9ffa391fbbab718841-1604018977", "category": "Payload delivery", "uuid": "0a12e25c-7af6-451c-89c4-7271054033fd" }, { "type": "text", "object_relation": "detection-ratio", "value": "60/71", "category": "Payload delivery", "uuid": "e2bb5a54-e149-4d1b-bc9e-e77b95ce1488" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b5ad9db6-0a4e-469b-8ac0-253343f5ad6c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "pattern": "[file:hashes.MD5 = '08e30482aa254ff92af3a14d8e0d0cb4' AND file:hashes.SHA1 = 'f561e3ae00b534805045f3ee86c5381d23d0fa1c' AND file:hashes.SHA256 = 'e5da410cbba9e76ea9510985653984b63e5af501a2e542c9c29def8c1ded23c3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bf16277d-9e5c-4ccb-9be4-d9cfbb73d9dc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-09-23T15:03:40+00:00", "category": "Other", "uuid": "9b8da257-06cb-402d-b93c-b855991943f2" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/e5da410cbba9e76ea9510985653984b63e5af501a2e542c9c29def8c1ded23c3/detection/f-e5da410cbba9e76ea9510985653984b63e5af501a2e542c9c29def8c1ded23c3-1600873420", "category": "Payload delivery", "uuid": "5a6cdba7-9243-4aa6-89ca-6fbc19414eb8" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/70", "category": "Payload delivery", "uuid": "b9071bf8-cadb-4ee0-a67d-5b0370841d19" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3aa019cf-6f11-4c11-8dc3-8fc6362cc78f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "pattern": "[file:hashes.MD5 = '880a45ff31bc540e80ecf2cf93134c12' AND file:hashes.SHA1 = 'a09fb822da6e6a3b009a6239955f752a49b8ca2d' AND file:hashes.SHA256 = '694818ba3bbbd14949fea1441dd15ec721adc61f7f7de4cc728f449a2ef2c3c8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6ee0e6f3-3dc6-4bad-9153-ed89aa3bd203", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-14T10:50:12+00:00", "category": "Other", "uuid": "a3ddd465-74c2-45e6-93b4-3601997147a7" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/694818ba3bbbd14949fea1441dd15ec721adc61f7f7de4cc728f449a2ef2c3c8/detection/f-694818ba3bbbd14949fea1441dd15ec721adc61f7f7de4cc728f449a2ef2c3c8-1602672612", "category": "Payload delivery", "uuid": "9f940b76-04e7-4942-a757-2b354988f75e" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/71", "category": "Payload delivery", "uuid": "09ee55b1-9932-4e9b-9a8c-4cc98405471a" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2e764a7c-ecba-4130-9a68-3133b53bf5df", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "pattern": "[file:hashes.MD5 = 'bf8359bafbb198602226a01d73cde39b' AND file:hashes.SHA1 = '2229997bad7dbe5ee5a00c8977781dec861808d5' AND file:hashes.SHA256 = 'b43bb3af257e2c29ecf9add2ef4ad41c62e6b1298dc9af220ab0a285e23cb9db']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e3bd6581-d6d2-4b6f-a9a9-e1b31abb699e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:28+00:00", "category": "Other", "uuid": "37af8862-1b46-415e-9a04-9edf755549a9" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b43bb3af257e2c29ecf9add2ef4ad41c62e6b1298dc9af220ab0a285e23cb9db/detection/f-b43bb3af257e2c29ecf9add2ef4ad41c62e6b1298dc9af220ab0a285e23cb9db-1604018908", "category": "Payload delivery", "uuid": "c10b3d9f-7fa7-402e-9887-a45789f4bcb6" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/71", "category": "Payload delivery", "uuid": "66158cd8-3d8e-4d84-8de0-73736f0f2cd2" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d7dfa178-99ac-4825-a28b-5cb6880e06cd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:17.000Z", "modified": "2020-10-30T08:56:17.000Z", "pattern": "[file:hashes.MD5 = '489e8a0c6e1ebd01b4c961b15a36ae4f' AND file:hashes.SHA1 = 'd4c4afd63f0b4e443c8fbfc0dadd67637b51b254' AND file:hashes.SHA256 = '15305978d7c42e26d908feca9aed4efa3df89ae6524ecce10752a2ee3cdf813f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:17Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e4dcecdb-c624-4a3c-8204-66150147aa90", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-29T11:15:45+00:00", "category": "Other", "uuid": "4daee468-f1df-4786-8ad2-48996c9aaca2" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/15305978d7c42e26d908feca9aed4efa3df89ae6524ecce10752a2ee3cdf813f/detection/f-15305978d7c42e26d908feca9aed4efa3df89ae6524ecce10752a2ee3cdf813f-1603970145", "category": "Payload delivery", "uuid": "d340d819-6501-4ae1-a2a7-0087d29c080e" }, { "type": "text", "object_relation": "detection-ratio", "value": "29/71", "category": "Payload delivery", "uuid": "da565f7b-338f-4233-88f3-063a98aa6f41" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b6b91a9e-68d7-4ba3-8166-f504e3be3b6b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "pattern": "[file:hashes.MD5 = 'a75ec259d5c10934a801694ecb97c965' AND file:hashes.SHA1 = '36bd911c5598cc089f0945b08fc5ad720d024cd8' AND file:hashes.SHA256 = 'c0af45fb5b5ecaff8130bed61a8cdb4bac98f2c9ccc774bd6034576f865aaf6f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--21e7e39a-bd74-415d-8e88-f25186436c50", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:50+00:00", "category": "Other", "uuid": "afb736bb-7bb5-47cb-8e4b-ed1ff7dd3efb" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/c0af45fb5b5ecaff8130bed61a8cdb4bac98f2c9ccc774bd6034576f865aaf6f/detection/f-c0af45fb5b5ecaff8130bed61a8cdb4bac98f2c9ccc774bd6034576f865aaf6f-1604018930", "category": "Payload delivery", "uuid": "c445b283-0beb-492b-adc4-f185b30ff576" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/72", "category": "Payload delivery", "uuid": "4dca09d1-1cda-42f2-b183-6a9b5a1b10f9" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e87a965f-c0f1-4f03-897a-b5361fb2d880", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "pattern": "[file:hashes.MD5 = 'd60d21b56705a455258f3569f27cf373' AND file:hashes.SHA1 = '896628d7cf7a34bd325b0fdd3f88e8bf80e6a383' AND file:hashes.SHA256 = '88da60e5764ac7ead4db3a9ad0aa9f40e509a1d2df0380fa2e55cfdc8e3ad70a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--025f1bca-c27e-471f-85ef-03184b237b0a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-08-14T19:37:25+00:00", "category": "Other", "uuid": "3982ef20-e691-4e3c-9f2b-4cae187e62c4" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/88da60e5764ac7ead4db3a9ad0aa9f40e509a1d2df0380fa2e55cfdc8e3ad70a/detection/f-88da60e5764ac7ead4db3a9ad0aa9f40e509a1d2df0380fa2e55cfdc8e3ad70a-1597433845", "category": "Payload delivery", "uuid": "8d46e2b7-3db5-4c8b-822f-c1d09b238cb9" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/68", "category": "Payload delivery", "uuid": "a15c2c59-5433-4cd3-9bc3-35087dcd69d2" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--918be153-49bb-4879-b579-a382954e498c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "pattern": "[file:hashes.MD5 = 'fd8a05a79a3fa71d2f2d2f8dcd3894bd' AND file:hashes.SHA1 = 'c36a26b346bd0a1ecb5ed288cfebebffefb06d0f' AND file:hashes.SHA256 = '86c18925097fed036b2f63a8c50891266b6d5f0ddde84ee57f6c4da06e77100b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a29d49c3-f6e7-4100-b436-0c41692ab3a2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-09T12:09:43+00:00", "category": "Other", "uuid": "49844b33-9312-4ce6-8e01-d4c21f21043c" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/86c18925097fed036b2f63a8c50891266b6d5f0ddde84ee57f6c4da06e77100b/detection/f-86c18925097fed036b2f63a8c50891266b6d5f0ddde84ee57f6c4da06e77100b-1602245383", "category": "Payload delivery", "uuid": "87b78fd9-9874-4223-b8d1-cce7aa9356be" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/66", "category": "Payload delivery", "uuid": "7dacff4c-48d1-40a5-9109-9b8ce7fd2e01" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f7385be0-aa1d-4ef4-9157-6daec20898c1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "pattern": "[file:hashes.MD5 = 'b8a368fc14d2ed67aecf7e13b9efcf25' AND file:hashes.SHA1 = '2e2f28087f68cae3e51db88b761fd99304459a12' AND file:hashes.SHA256 = '9df20496f03f1e916dbaecbe7e99db411cd8044c13572d691febf13c22b7c572']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ff796147-94b9-4bb1-92e8-2a6fd814e7da", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-01-24T13:50:42+00:00", "category": "Other", "uuid": "42e65ec8-9fcc-4c55-804f-10786d0ed25b" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/9df20496f03f1e916dbaecbe7e99db411cd8044c13572d691febf13c22b7c572/detection/f-9df20496f03f1e916dbaecbe7e99db411cd8044c13572d691febf13c22b7c572-1579873842", "category": "Payload delivery", "uuid": "a7cc6915-f71c-4954-8c9e-0c18064986d0" }, { "type": "text", "object_relation": "detection-ratio", "value": "12/73", "category": "Payload delivery", "uuid": "73ebef01-55bc-4ab5-b4bc-d5cfa93a11b7" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--62c0a296-7be7-4cf1-984a-4b46b085caa4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "pattern": "[file:hashes.MD5 = 'aa720ab9cf0ef76aeb1a7e149f6bc5c7' AND file:hashes.SHA1 = '0c46bf6e4fdcbf098df141bfd588976cf84acb68' AND file:hashes.SHA256 = '2788d54e094014cd18ec11263659c344330b55ff3b0a14941215f14557b77777']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a9f7b81f-7604-443e-b586-0d3cf4805b56", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-11T04:15:10+00:00", "category": "Other", "uuid": "4934476a-c325-4a79-8b4e-082eddaf6fc4" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/2788d54e094014cd18ec11263659c344330b55ff3b0a14941215f14557b77777/detection/f-2788d54e094014cd18ec11263659c344330b55ff3b0a14941215f14557b77777-1602389710", "category": "Payload delivery", "uuid": "7f5b3e3e-291a-405b-a674-c3b3adcc15d2" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/70", "category": "Payload delivery", "uuid": "b08699ac-77d8-4f98-81ac-9bac51ace8fa" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2dbadbc3-f1de-4ffb-92ad-bf50f91c6a19", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "pattern": "[file:hashes.MD5 = '6afda62f82bd6585e40a6a86005567e8' AND file:hashes.SHA1 = '3ce224eaf4cb5ada496983b759ab113515c02cb0' AND file:hashes.SHA256 = '5fc68cab9ed345259fa2b452f63e9bc9b1c61285fb0445e60b2744c211bddeb8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bf998784-79f9-4511-a2b2-498c898e185a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:43:36+00:00", "category": "Other", "uuid": "632bbd05-1bf9-4419-9cbe-0efc3539a62a" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/5fc68cab9ed345259fa2b452f63e9bc9b1c61285fb0445e60b2744c211bddeb8/detection/f-5fc68cab9ed345259fa2b452f63e9bc9b1c61285fb0445e60b2744c211bddeb8-1604018616", "category": "Payload delivery", "uuid": "265a3fbe-8909-4c37-943d-00ab678ab89d" }, { "type": "text", "object_relation": "detection-ratio", "value": "61/72", "category": "Payload delivery", "uuid": "86d0ae30-362e-4d9e-aeb9-5e4bcbdf038a" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d331b125-a13e-4057-b5ce-bf053af711cf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "pattern": "[file:hashes.MD5 = '587a9cbcaec3ddceeba5a0fadd601d2d' AND file:hashes.SHA1 = '384bc386449f6e0c33d9345e6a934f63640e3706' AND file:hashes.SHA256 = '2af2ab80575400c191925d15f83726718655b8adad1c7bd02e4abe21d1004b95']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--de27aef4-ed60-404f-9ba4-597005687128", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:47+00:00", "category": "Other", "uuid": "cd2f7d38-46a3-42da-b55f-58f6383a2930" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/2af2ab80575400c191925d15f83726718655b8adad1c7bd02e4abe21d1004b95/detection/f-2af2ab80575400c191925d15f83726718655b8adad1c7bd02e4abe21d1004b95-1604018567", "category": "Payload delivery", "uuid": "be6c3311-ce0f-48fd-b70e-671f482ac6e6" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/70", "category": "Payload delivery", "uuid": "d3a9136c-8931-4bcb-b939-f35c4473b6f7" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f2784493-71c7-4b60-ad28-ad9a09f8cdc0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "pattern": "[file:hashes.MD5 = 'fcd62559c2fbd5e5834f46efd28939ac' AND file:hashes.SHA1 = '4c07ea60cae61d92e248c47225e726b191e48426' AND file:hashes.SHA256 = 'b2891d26b7b66dca32f02681a0f1f3866a2efae49d8b5ec6bf4cbbdf5ff35260']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--00ea0bff-a83d-406f-8b8f-a77c7be4c548", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-10T07:38:58+00:00", "category": "Other", "uuid": "0abbdee7-5aa1-4c78-8444-5db9fe20f443" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b2891d26b7b66dca32f02681a0f1f3866a2efae49d8b5ec6bf4cbbdf5ff35260/detection/f-b2891d26b7b66dca32f02681a0f1f3866a2efae49d8b5ec6bf4cbbdf5ff35260-1602315538", "category": "Payload delivery", "uuid": "0b3ed77a-29b1-4bec-a49b-f646d7533379" }, { "type": "text", "object_relation": "detection-ratio", "value": "35/69", "category": "Payload delivery", "uuid": "b6c6c521-c013-4ce6-b366-333b36a3ad25" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bd853739-de6d-4768-8a0a-ce7724eec488", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:18.000Z", "modified": "2020-10-30T08:56:18.000Z", "pattern": "[file:hashes.MD5 = '760260bff15dd371734758c89c748ee4' AND file:hashes.SHA1 = '4f957a30db5599f57777a0377119b9bd7cd40f78' AND file:hashes.SHA256 = 'b294f8636f7ac5318560f3b8f949c1004340923d6aaaceed93481c3ba916d407']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:18Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2730a41a-4db9-4941-b48d-74b906548f6c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-13T16:16:31+00:00", "category": "Other", "uuid": "c8a07a8e-c97e-472a-98a3-c8985ca0195a" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b294f8636f7ac5318560f3b8f949c1004340923d6aaaceed93481c3ba916d407/detection/f-b294f8636f7ac5318560f3b8f949c1004340923d6aaaceed93481c3ba916d407-1602605791", "category": "Payload delivery", "uuid": "5ee87664-495e-4a59-9fa8-11fc4757174c" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/68", "category": "Payload delivery", "uuid": "dfffe232-cb81-4ad8-90a5-7e509f0b219a" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e910ee1e-2815-4633-b427-104b225074f5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "pattern": "[file:hashes.MD5 = '25aa62b8f71e50b733100a65919cb451' AND file:hashes.SHA1 = '475ec23b841e135127546501e60afb2e58b62036' AND file:hashes.SHA256 = '21ead6c4722d06207332710f2dff6005bc5095034cffa7f60e57a77f651efa1c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e068d586-bfea-47d5-93c3-350f8e62500d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-04-17T16:43:50+00:00", "category": "Other", "uuid": "c98a78a4-2707-4192-882f-d7779c4b32c4" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/21ead6c4722d06207332710f2dff6005bc5095034cffa7f60e57a77f651efa1c/detection/f-21ead6c4722d06207332710f2dff6005bc5095034cffa7f60e57a77f651efa1c-1587141830", "category": "Payload delivery", "uuid": "7e7e11b9-12c6-41e2-8bf1-beb4728669d6" }, { "type": "text", "object_relation": "detection-ratio", "value": "39/70", "category": "Payload delivery", "uuid": "6a5ebeed-1323-4e8d-9ead-abaa18973a1e" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--815fd311-7b72-48a8-b229-17fd3b51ee79", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "pattern": "[file:hashes.MD5 = 'aae329ca530837a782b24119d66c526b' AND file:hashes.SHA1 = 'f06decb1964601d89cbefbe84e3a34a91f0ace18' AND file:hashes.SHA256 = '1bc061bbde8e89345da6461916fc70a4b2b50126ba25f553e15fa692bc22e92e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8c70d678-a6ce-40f3-91f0-6f607cf17d29", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:18+00:00", "category": "Other", "uuid": "7a882a94-ed65-43cb-9d5d-2799e6a91834" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/1bc061bbde8e89345da6461916fc70a4b2b50126ba25f553e15fa692bc22e92e/detection/f-1bc061bbde8e89345da6461916fc70a4b2b50126ba25f553e15fa692bc22e92e-1604018538", "category": "Payload delivery", "uuid": "62d41416-6671-4a84-ac0f-354982fecde3" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/71", "category": "Payload delivery", "uuid": "334ec7ce-d085-42d9-b3a2-463b8d35a0ab" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0405a5d7-db95-4327-95c0-b6a0a20542cf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "pattern": "[file:hashes.MD5 = 'f275ebb10010aa50fd9b5d8be10366ca' AND file:hashes.SHA1 = '99ce61ec58ac62c53685ba7812f155ba19c3fdf9' AND file:hashes.SHA256 = '7187ec55dcd998f3ee207a0733a162604c40dc6920ef47424bcbaaa1dba68da3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--484616fd-564a-41cc-ab11-b27601894e64", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-28T01:37:29+00:00", "category": "Other", "uuid": "8d9aafbc-430e-4676-b1da-7da86e63d9f4" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/7187ec55dcd998f3ee207a0733a162604c40dc6920ef47424bcbaaa1dba68da3/detection/f-7187ec55dcd998f3ee207a0733a162604c40dc6920ef47424bcbaaa1dba68da3-1603849049", "category": "Payload delivery", "uuid": "0c4fa807-9796-4683-9653-1196696686bd" }, { "type": "text", "object_relation": "detection-ratio", "value": "40/61", "category": "Payload delivery", "uuid": "b8720b1e-ace1-4afd-ad3c-2145a53e1a13" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3789b1a0-f5cd-4797-ac5e-3d0818ba37b7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "pattern": "[file:hashes.MD5 = '8092ab5e074ea60ac75415b29a2f7b10' AND file:hashes.SHA1 = '6fc0e1fddd24a8fbe93b9b8773da8e25f83a3dd7' AND file:hashes.SHA256 = '75d9c67b853fb26ba28ae5dcfc0631fd9fc4addc69d579edfd98bbbbdb4d9187']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5579c4b5-b230-43d8-9886-a6121ec0cb5b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-12T01:50:11+00:00", "category": "Other", "uuid": "4d9f5757-b5ef-47cb-bc8e-941ceb7a7f4c" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/75d9c67b853fb26ba28ae5dcfc0631fd9fc4addc69d579edfd98bbbbdb4d9187/detection/f-75d9c67b853fb26ba28ae5dcfc0631fd9fc4addc69d579edfd98bbbbdb4d9187-1602467411", "category": "Payload delivery", "uuid": "dba1d4a6-38a9-4326-ac9e-a45d8615739e" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/70", "category": "Payload delivery", "uuid": "ff512360-0db7-4a1a-86d0-e81bac2f9236" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--fc290971-f01f-4a27-b43c-07cd460da553", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "pattern": "[file:hashes.MD5 = '4dbb604a804c77945f58cffa488cb48f' AND file:hashes.SHA1 = '0f5fbb9a2486fb5c0540e4d720e46035ca1fb9d8' AND file:hashes.SHA256 = '7b8f932ca62ecc8e0a071177075118ba4b050f785857925a3dac6835e230d602']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a32edaaa-09b9-4070-9659-6f65980fa8c7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-09-17T08:52:07+00:00", "category": "Other", "uuid": "bc8b5775-d4b3-4e5d-abdf-653fd5a30ee3" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/7b8f932ca62ecc8e0a071177075118ba4b050f785857925a3dac6835e230d602/detection/f-7b8f932ca62ecc8e0a071177075118ba4b050f785857925a3dac6835e230d602-1600332727", "category": "Payload delivery", "uuid": "3f757992-acb4-461d-bb48-dbec83688016" }, { "type": "text", "object_relation": "detection-ratio", "value": "38/66", "category": "Payload delivery", "uuid": "5bd42475-dc81-4b67-b345-7071cd5569ba" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a3b413be-28f2-4493-a5ea-7ce2ddf052cf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "pattern": "[file:hashes.MD5 = '1a0dfbd78d21316167f4a05f56e25e6f' AND file:hashes.SHA1 = 'e0e3bc73e13628ed2d01184beab13bee6b97676c' AND file:hashes.SHA256 = 'b0a5775907994eea4adf0faa505b28160d22507c1690ca508820e26fb4ca3bca']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d355ca07-12b1-4d4b-ae89-aedc781725c1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-15T07:18:49+00:00", "category": "Other", "uuid": "bcaea4e3-b356-4de4-8fe6-022e9a11cab6" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b0a5775907994eea4adf0faa505b28160d22507c1690ca508820e26fb4ca3bca/detection/f-b0a5775907994eea4adf0faa505b28160d22507c1690ca508820e26fb4ca3bca-1602746329", "category": "Payload delivery", "uuid": "610efae1-2900-45ab-b7f2-31b44ca48a07" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/70", "category": "Payload delivery", "uuid": "10c04fc3-2e1b-451e-8c82-2ae23ad31a2b" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--df33d0fa-6d8d-438b-b826-144b187ece1c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "pattern": "[file:hashes.MD5 = '3bbf3184e8600a3b9748011100a0cb18' AND file:hashes.SHA1 = '783603cc5d3253097cfd798ca4c1e46057081560' AND file:hashes.SHA256 = 'd22cfa87be0f204ae7da13897dfcd075c9f25414e1792762412e9ae61d0ce3f0']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--74b71387-2317-4822-b0f2-01ad97f9047e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-29T17:29:14+00:00", "category": "Other", "uuid": "e656fe37-d9f3-4bbe-b2ec-824c6a68ae4d" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/d22cfa87be0f204ae7da13897dfcd075c9f25414e1792762412e9ae61d0ce3f0/detection/f-d22cfa87be0f204ae7da13897dfcd075c9f25414e1792762412e9ae61d0ce3f0-1603992554", "category": "Payload delivery", "uuid": "493131a4-5905-4012-8319-235f3deedb97" }, { "type": "text", "object_relation": "detection-ratio", "value": "19/72", "category": "Payload delivery", "uuid": "9197b145-401e-494f-8bd5-9f71ae716b9a" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9af3492c-af01-4736-86e1-3430a33b492a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "pattern": "[file:hashes.MD5 = '98c0b1dff2cdaa3bce5af881241e35b1' AND file:hashes.SHA1 = 'c59602398e803780cfd9e2b533fcf3c3f415484b' AND file:hashes.SHA256 = 'd931fe8da243e359e9e14f529eafe590b8c2dd1e76ca1ad833dd0f927648f88b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3177bc73-b1ec-43db-bdde-4042d60c51cd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-01-23T22:03:52+00:00", "category": "Other", "uuid": "0bf69c02-13be-47f6-9a19-1bd781330a83" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/d931fe8da243e359e9e14f529eafe590b8c2dd1e76ca1ad833dd0f927648f88b/detection/f-d931fe8da243e359e9e14f529eafe590b8c2dd1e76ca1ad833dd0f927648f88b-1579817032", "category": "Payload delivery", "uuid": "ac130e21-39a9-48fa-b20c-c5f2ce9c5e04" }, { "type": "text", "object_relation": "detection-ratio", "value": "45/72", "category": "Payload delivery", "uuid": "b646dbfa-2d6b-4758-aff7-389a5a6df06d" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--eaac6baa-ed1f-4dbf-b0d6-438bf4ce64b5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:19.000Z", "modified": "2020-10-30T08:56:19.000Z", "pattern": "[file:hashes.MD5 = '3789bb16ff935931d9c78a69084b2296' AND file:hashes.SHA1 = '5024612d41766b59180521d5025a734a0be575b3' AND file:hashes.SHA256 = 'b89742731932a116bd973e61628bbe4f5d7d92b53df3402e404f63003bac5104']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:19Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--86b6ea9e-9699-4e6e-b2e4-5d289359ccc7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-09-18T21:53:10+00:00", "category": "Other", "uuid": "8225f9e6-80ac-4dbc-a20a-d93f6f53a53d" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b89742731932a116bd973e61628bbe4f5d7d92b53df3402e404f63003bac5104/detection/f-b89742731932a116bd973e61628bbe4f5d7d92b53df3402e404f63003bac5104-1600465990", "category": "Payload delivery", "uuid": "a80ec924-0d21-404f-9a89-c61fdc9c00fb" }, { "type": "text", "object_relation": "detection-ratio", "value": "45/65", "category": "Payload delivery", "uuid": "6f9841bc-4765-48f5-89a1-7f88ebd01b7f" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--f3344dbd-f6a7-484d-a4d9-75fb5e9b9acf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "pattern": "[file:hashes.MD5 = '60402b4ddfcd3b9a62554fb1a796d9e8' AND file:hashes.SHA1 = '88eb5f98dda8899c93ac2b0c802d00e424fd4219' AND file:hashes.SHA256 = '7bdaaf431bbf0880b0f1276042bd1adeb192d183795c30834b61e2335d279230']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f00111c5-411a-4b56-8240-726b65b12afb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:44:14+00:00", "category": "Other", "uuid": "24786b64-3b03-4258-afb0-eff0acf003ab" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/7bdaaf431bbf0880b0f1276042bd1adeb192d183795c30834b61e2335d279230/detection/f-7bdaaf431bbf0880b0f1276042bd1adeb192d183795c30834b61e2335d279230-1604018654", "category": "Payload delivery", "uuid": "7cb7c92a-098f-4bca-9160-62c49fd95813" }, { "type": "text", "object_relation": "detection-ratio", "value": "54/69", "category": "Payload delivery", "uuid": "d80934ea-038d-4ac3-8f6b-7b55f24250d4" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--29e91ca5-7461-4a16-b343-c0fb04e0ce3c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "pattern": "[file:hashes.MD5 = '90d07971e399187003e0b9bbd8bc11b2' AND file:hashes.SHA1 = 'a9e1573278794ecbc5ddf2c2bdbdff63ea2d0f4d' AND file:hashes.SHA256 = 'f9c6dca22e336cf71ce4be540905b34b5a63a7d02eb9bbd8a40fc83e37154c22']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--58c39a24-6350-4af2-ab12-ad1a4af2e1db", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-08-26T20:40:33+00:00", "category": "Other", "uuid": "ab8045de-b5de-46df-884b-2484c26f016f" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/f9c6dca22e336cf71ce4be540905b34b5a63a7d02eb9bbd8a40fc83e37154c22/detection/f-f9c6dca22e336cf71ce4be540905b34b5a63a7d02eb9bbd8a40fc83e37154c22-1598474433", "category": "Payload delivery", "uuid": "f1777a00-b268-48da-ad64-166a073418a8" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/69", "category": "Payload delivery", "uuid": "5f2c6e0c-4760-4fea-b05b-79a3c7990e2a" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--12b3a3a2-6f5a-4654-b899-6a56b204da23", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "pattern": "[file:hashes.MD5 = '2445fed3c3af5916c86cf068ba57652c' AND file:hashes.SHA1 = '15744a030426d5501cba747971a86d5039ba4d49' AND file:hashes.SHA256 = 'f9507a76801d5b1b83704a5019cdc312de18b004f16c5547b91b7dba086b2e29']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--09e6d590-7b5e-405c-b4fc-55538d5ed355", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-04-06T18:32:38+00:00", "category": "Other", "uuid": "479c277f-abc3-4252-bc8d-b9d376047860" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/f9507a76801d5b1b83704a5019cdc312de18b004f16c5547b91b7dba086b2e29/detection/f-f9507a76801d5b1b83704a5019cdc312de18b004f16c5547b91b7dba086b2e29-1586197958", "category": "Payload delivery", "uuid": "32dfab4f-e186-4076-b564-86d1803fde2f" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/72", "category": "Payload delivery", "uuid": "4af6f9e4-4883-45a0-bd14-65ed01dfb23b" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--959930b1-e452-4086-8de7-f4eb2211867a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "pattern": "[file:hashes.MD5 = '62660f7917629bdada5fae9be4866f7f' AND file:hashes.SHA1 = 'bbd1a374e7852a2f70369aac2d9eb7bacd4debe3' AND file:hashes.SHA256 = '8447befbf1643aae5219fc13354628f00c61683fb7b86bb0294a95b3eb62a344']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--075a0a66-ea46-4d51-93a6-8b806b4e06e4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:44:28+00:00", "category": "Other", "uuid": "aea58c8e-290d-4d36-8362-0c897c806e49" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/8447befbf1643aae5219fc13354628f00c61683fb7b86bb0294a95b3eb62a344/detection/f-8447befbf1643aae5219fc13354628f00c61683fb7b86bb0294a95b3eb62a344-1604018668", "category": "Payload delivery", "uuid": "e8eb206a-fdd3-4ca5-ad5b-8a926c45e01f" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "a014f997-a5e4-4d54-a955-3f0741ca026f" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--48526a88-0d80-4ddd-b72c-eff9063d9336", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "pattern": "[file:hashes.MD5 = 'ba17a1fd0e350c77a58c88ae6aa28aaa' AND file:hashes.SHA1 = '1da3a7a84386aa4a278677bff97c5e23aa6bbd0a' AND file:hashes.SHA256 = '2376a8da650c124b3d916765f82929b4109f20bc4f211a39a4d1cd4391780d1f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9ce1ccb1-8ae7-4ac8-abb6-3d1526ae1fdb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-27T14:40:07+00:00", "category": "Other", "uuid": "6746d61b-402d-42eb-845a-ac0d606d9a07" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/2376a8da650c124b3d916765f82929b4109f20bc4f211a39a4d1cd4391780d1f/detection/f-2376a8da650c124b3d916765f82929b4109f20bc4f211a39a4d1cd4391780d1f-1603809607", "category": "Payload delivery", "uuid": "7e3836dc-32bc-454a-aab4-e9f0325789ca" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/69", "category": "Payload delivery", "uuid": "516e8d41-087e-4293-a7ef-6f14e28f413d" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4b8826a4-1cb6-4ce6-b5a7-2ea20fafcfb4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "pattern": "[file:hashes.MD5 = 'ed0f520d410a684c6d0548dbf4caea98' AND file:hashes.SHA1 = '6381fc7e6d39549e0f7e65ac8151eeb6d70ecef9' AND file:hashes.SHA256 = '093ac1213b112c7eb7c46000f04160af37339ce0d6fff514f0941f2b5ab48829']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d3c98553-110e-4c61-a5e7-048641e3c170", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:41:57+00:00", "category": "Other", "uuid": "03aac0eb-30cf-4098-bea6-f8f9f5b4a567" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/093ac1213b112c7eb7c46000f04160af37339ce0d6fff514f0941f2b5ab48829/detection/f-093ac1213b112c7eb7c46000f04160af37339ce0d6fff514f0941f2b5ab48829-1604018517", "category": "Payload delivery", "uuid": "636638d9-d98b-400e-982f-a7ad73a323f4" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/71", "category": "Payload delivery", "uuid": "2aa0152a-f9ba-4525-98b4-aa6e539d9bb6" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--34884b9e-28f3-4729-8ca3-8875cae378cb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "pattern": "[file:hashes.MD5 = '7e7023a81ca8f0d86211899ca85a5ba8' AND file:hashes.SHA1 = '7269f7b584b54a106a32b6b0223690dbb1a24763' AND file:hashes.SHA256 = 'ae696adba9e93dbc97b2f0a0c13c962cd90e5b03943e68f06e6e1b8f8d6cbd00']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a309d336-b26a-445f-93f0-fce29cdc5fb3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:10+00:00", "category": "Other", "uuid": "347147bb-531a-41ec-b98b-baa592a28159" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/ae696adba9e93dbc97b2f0a0c13c962cd90e5b03943e68f06e6e1b8f8d6cbd00/detection/f-ae696adba9e93dbc97b2f0a0c13c962cd90e5b03943e68f06e6e1b8f8d6cbd00-1604018890", "category": "Payload delivery", "uuid": "7a97011c-3a0f-40e6-b081-00c1c348f888" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/72", "category": "Payload delivery", "uuid": "ebfa459e-87fb-4cfb-84c0-a07d1c4834cd" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b61b3d4a-28e6-44ef-b1b2-a2b36a4eae64", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "pattern": "[file:hashes.MD5 = '1b86ed07525ddecddcb8aea6c9caada2' AND file:hashes.SHA1 = '75148f9225000ad9114d3802122a6fbc1167d15f' AND file:hashes.SHA256 = '1925d5e283a220497385b4d8ca268665c729d1e029692e23431c327a8378fe23']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--0e1f1a26-a52d-4079-96b3-0db6699c2ac5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:16+00:00", "category": "Other", "uuid": "ab66d988-c6d3-44b4-8959-61ef5b55dcd1" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/1925d5e283a220497385b4d8ca268665c729d1e029692e23431c327a8378fe23/detection/f-1925d5e283a220497385b4d8ca268665c729d1e029692e23431c327a8378fe23-1604018536", "category": "Payload delivery", "uuid": "4bf3c1e2-a108-432a-92ec-927ad7f815ab" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "4efdfd9f-23bb-4693-b1fd-adcaf9101e18" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1c0f1467-b600-477e-b547-2f3fab94e40c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:20.000Z", "modified": "2020-10-30T08:56:20.000Z", "pattern": "[file:hashes.MD5 = 'f1c35cf848d984785e9c0621958fe5ae' AND file:hashes.SHA1 = '90b9229c12362b32b42fb66118bdf1adc597d2f0' AND file:hashes.SHA256 = '609401cd35b4ede77bb717005bd2875f0a018442e194ec8af78595f185665f12']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:20Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--493ee987-5bd4-4447-a109-50c6fdeeae8c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-10T07:38:45+00:00", "category": "Other", "uuid": "5a4e4203-ba41-4926-a806-11363e6e30ae" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/609401cd35b4ede77bb717005bd2875f0a018442e194ec8af78595f185665f12/detection/f-609401cd35b4ede77bb717005bd2875f0a018442e194ec8af78595f185665f12-1602315525", "category": "Payload delivery", "uuid": "8dd099cc-a900-47bd-982e-9ab9e06fda5b" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/68", "category": "Payload delivery", "uuid": "ca8d14bc-2d72-4db2-9324-810f56ba0c8e" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8ebf900e-115e-4b27-b918-a07645b68a14", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "pattern": "[file:hashes.MD5 = '12dddb2cdefb0a99005639511fc0ffd1' AND file:hashes.SHA1 = '3bbeafa82894becec6bd6c62f3e90c3c7e576184' AND file:hashes.SHA256 = '10f0cb6dc3bb42145482fd3b353b11626283edd62b6a6a6b1505927d6d71a914']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fb7fb320-1174-403e-b929-eb9db6eed7b3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-26T07:39:11+00:00", "category": "Other", "uuid": "5030fe48-1c54-412e-8eec-06ca22c7901f" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/10f0cb6dc3bb42145482fd3b353b11626283edd62b6a6a6b1505927d6d71a914/detection/f-10f0cb6dc3bb42145482fd3b353b11626283edd62b6a6a6b1505927d6d71a914-1603697951", "category": "Payload delivery", "uuid": "68241317-3fb8-4335-9abf-22b530128147" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/61", "category": "Payload delivery", "uuid": "65e3a43e-75aa-4408-ad00-1e4cd4719015" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2a4282df-4e58-4422-bee3-ed2865b6b284", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "pattern": "[file:hashes.MD5 = '5b6fbbc6df37810784d79ac27774b8bd' AND file:hashes.SHA1 = '0d4e5242c96844fd39b13093f14f9a34368d4f03' AND file:hashes.SHA256 = '032a087b0f7c722a64bbced9612e84bb0a7f1872a8b94406ca49827d56aa466d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7c97fc9c-4c09-4493-adf7-12e22ac2594a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-08-17T21:56:22+00:00", "category": "Other", "uuid": "d0863e5b-bd32-45ae-8705-3a9908072cef" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/032a087b0f7c722a64bbced9612e84bb0a7f1872a8b94406ca49827d56aa466d/detection/f-032a087b0f7c722a64bbced9612e84bb0a7f1872a8b94406ca49827d56aa466d-1597701382", "category": "Payload delivery", "uuid": "88879f13-0bb7-47ae-9564-c64712ab0b44" }, { "type": "text", "object_relation": "detection-ratio", "value": "44/69", "category": "Payload delivery", "uuid": "c047a1ec-ca16-4d5d-be0b-1d4e73017fe8" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7d7d4a70-ee4c-43b8-aa5d-42b62e4aa777", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "pattern": "[file:hashes.MD5 = '0df5fb7e8015daeec8944c9681676eae' AND file:hashes.SHA1 = 'f3da880ebb254f5f191f2e546eec8c5518fa991b' AND file:hashes.SHA256 = '52951e174db7986b334417d5641b06a80464c9665bf82393857fa6700beef006']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2e02e67e-0651-4277-94da-242d2e623fa6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-29T03:27:59+00:00", "category": "Other", "uuid": "22d07f65-3594-480c-a396-a2491a9bc243" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/52951e174db7986b334417d5641b06a80464c9665bf82393857fa6700beef006/detection/f-52951e174db7986b334417d5641b06a80464c9665bf82393857fa6700beef006-1603942079", "category": "Payload delivery", "uuid": "7164e6c6-60a3-4cb2-b89a-5186f1fb025b" }, { "type": "text", "object_relation": "detection-ratio", "value": "38/70", "category": "Payload delivery", "uuid": "27e8c5df-c886-40e2-8880-a86283a3fc13" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c57ba634-6efb-408a-8c09-2a0e293ca19f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "pattern": "[file:hashes.MD5 = 'f0a7c2c089f2b1ebdd488e4bda4ac1cf' AND file:hashes.SHA1 = '2d763482008bcfa1f0476049029fef017c58192f' AND file:hashes.SHA256 = '8e421c6145b4ee499c747c7544d16f331d0bfd282b40efddcf66d8eb3fbf51cd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3df16408-ad08-4c07-b8ed-013fb5e5776a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:47:34+00:00", "category": "Other", "uuid": "afd1d726-9cd1-4dd5-a18e-5f189e80ae63" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/8e421c6145b4ee499c747c7544d16f331d0bfd282b40efddcf66d8eb3fbf51cd/detection/f-8e421c6145b4ee499c747c7544d16f331d0bfd282b40efddcf66d8eb3fbf51cd-1604018854", "category": "Payload delivery", "uuid": "8780e61e-0ed8-43c8-9ba1-fb4bba225b78" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/70", "category": "Payload delivery", "uuid": "8bf05649-5f13-4541-a51d-1e5e8ebb694b" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--38d1cb99-e855-4370-a0a8-e182a278c949", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "pattern": "[file:hashes.MD5 = '27b341fa2aa731335273204cb112a414' AND file:hashes.SHA1 = '3ba6ebc1ceca4a37fd13ac4875f2afddb046151c' AND file:hashes.SHA256 = '2facd367c1299ef200934cfd06279f177f9e3145164e4bd595e2b94a403a1b02']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3f5d58f8-14e3-4c42-a101-615cd46b331e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:54+00:00", "category": "Other", "uuid": "620b9489-b831-4d11-9d0e-3ab96a435eb6" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/2facd367c1299ef200934cfd06279f177f9e3145164e4bd595e2b94a403a1b02/detection/f-2facd367c1299ef200934cfd06279f177f9e3145164e4bd595e2b94a403a1b02-1604018574", "category": "Payload delivery", "uuid": "b9be9685-9639-4ba3-9e9a-82f84b3556b8" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/69", "category": "Payload delivery", "uuid": "6ccc5a58-15da-4d8c-98ab-be569022477e" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--255c13ee-0a73-4ee2-8a83-faa9dd470949", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "pattern": "[file:hashes.MD5 = '9e7167948aa758165ce8cfe9c18ff599' AND file:hashes.SHA1 = 'e1ada7d696ec814d5b4f6705155853df17fded08' AND file:hashes.SHA256 = '328456cc7c585d290ba0543f6183afb0f8e31a1cfd24019644ea6471129bad9d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--55e00e7a-0bd7-454a-a2ea-89b3f6657ffc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-12T15:12:41+00:00", "category": "Other", "uuid": "66b6a92d-d119-4db8-b1e4-5dc3c07a4471" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/328456cc7c585d290ba0543f6183afb0f8e31a1cfd24019644ea6471129bad9d/detection/f-328456cc7c585d290ba0543f6183afb0f8e31a1cfd24019644ea6471129bad9d-1602515561", "category": "Payload delivery", "uuid": "8e9f077f-d39d-45ff-9ed0-2475a8c234e7" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/70", "category": "Payload delivery", "uuid": "35dd3925-d59c-4cce-9177-8917d2cfea5b" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1e2f2b4a-6d4c-4a60-84ff-7ea3d7593836", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "pattern": "[file:hashes.MD5 = '1ec098f0eae243d12a2f04e7a96b59e5' AND file:hashes.SHA1 = 'e058f8c7ae04b5a339ebd89922b10f803cb82877' AND file:hashes.SHA256 = '3c484486d455b4c13e8fbbf612b4ab3c4cfc519dd5a81c2478a7e4ab9c08e83a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7ab00ac0-8a31-4970-a44a-af22ef8267dc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-16T10:02:23+00:00", "category": "Other", "uuid": "6f3e7988-85e6-4fe1-9111-410bb54666e5" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/3c484486d455b4c13e8fbbf612b4ab3c4cfc519dd5a81c2478a7e4ab9c08e83a/detection/f-3c484486d455b4c13e8fbbf612b4ab3c4cfc519dd5a81c2478a7e4ab9c08e83a-1602842543", "category": "Payload delivery", "uuid": "e0bad524-2e44-4d13-a047-f3bd2fbcd011" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/70", "category": "Payload delivery", "uuid": "a8f45bb3-bee9-4207-b9cf-1db176792d09" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9dab14e9-110e-4e3c-b6ef-077e8b271b1c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "pattern": "[file:hashes.MD5 = '19cd00f27ac3aa90ca7262df46bbdaea' AND file:hashes.SHA1 = '4b031da0ee0881b1becce11c195a42302180b7b6' AND file:hashes.SHA256 = 'd8ab0c6982ea7674ed4e53e4bfc7234a56b018090819b79f67a9cc6034fc98e2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a0ef52a5-9179-4e7d-8599-c91ce3cbc3ed", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:49:12+00:00", "category": "Other", "uuid": "1035e5bb-7169-486b-850e-238cf4db7c7e" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/d8ab0c6982ea7674ed4e53e4bfc7234a56b018090819b79f67a9cc6034fc98e2/detection/f-d8ab0c6982ea7674ed4e53e4bfc7234a56b018090819b79f67a9cc6034fc98e2-1604018952", "category": "Payload delivery", "uuid": "3b2653ef-ee25-4341-9da4-1e3cb3358ee3" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/71", "category": "Payload delivery", "uuid": "479af389-c6a9-44ee-90e6-eb8ac544a7fc" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--de2c6a1f-b0fd-4c3a-8046-6e259ecd7e33", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:21.000Z", "modified": "2020-10-30T08:56:21.000Z", "pattern": "[file:hashes.MD5 = '86040cffd0975f75db6e7858f26d6d5f' AND file:hashes.SHA1 = '5bc86b78c0d1647aa4c8a96459962ff106904e64' AND file:hashes.SHA256 = 'f7a66c1ed76f696c0d3d3d5c49e88b6cebf35ff232c5094d3284f7fe484a90a3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:21Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5a11630a-39c6-4a6e-aacf-d681532964d8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:49:54+00:00", "category": "Other", "uuid": "8108a425-6f20-4552-a04c-8c72f72a04ae" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/f7a66c1ed76f696c0d3d3d5c49e88b6cebf35ff232c5094d3284f7fe484a90a3/detection/f-f7a66c1ed76f696c0d3d3d5c49e88b6cebf35ff232c5094d3284f7fe484a90a3-1604018994", "category": "Payload delivery", "uuid": "b8d92b9b-cbb6-4d05-92a0-ec75c8c6b6e3" }, { "type": "text", "object_relation": "detection-ratio", "value": "61/71", "category": "Payload delivery", "uuid": "09abd071-c37e-4e3b-a0cd-f99e5ad11e71" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c27ef6ef-3a71-4749-8719-49947bb36071", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "pattern": "[file:hashes.MD5 = '2a88499580bd343dc6c80838da65c6e8' AND file:hashes.SHA1 = '080aa5303322451844b557f7fbf8a09817cea74b' AND file:hashes.SHA256 = '32839e342815cda42bef871d999d76db91dd465972a2b39d4e29fb367a57cfd5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f9421198-639e-495d-97f0-7db5082ce37d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:43:01+00:00", "category": "Other", "uuid": "f2595b3c-4e34-4705-a06c-647912574ca0" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/32839e342815cda42bef871d999d76db91dd465972a2b39d4e29fb367a57cfd5/detection/f-32839e342815cda42bef871d999d76db91dd465972a2b39d4e29fb367a57cfd5-1604018581", "category": "Payload delivery", "uuid": "61be0c4d-c2fe-4192-83af-8163d1ef3b82" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/71", "category": "Payload delivery", "uuid": "26c6f5b7-231e-464c-a6c0-1a2e2539b342" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ba8d598d-5a7d-410c-9c54-b214aa1962f9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "pattern": "[file:hashes.MD5 = '260b0e17e42ad6ba1450f5015098acb8' AND file:hashes.SHA1 = '32932285a7d8107f2e86e3ea2508ea06b1c039d8' AND file:hashes.SHA256 = '01ad70e688a4eb070e90538728de699efbaa6bbfeaa728976053384587e45d18']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b2f94bd9-50fd-45f2-acc4-46affe62f4f0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:41:44+00:00", "category": "Other", "uuid": "b32001a7-a69c-4fbc-870c-94e153440a6e" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/01ad70e688a4eb070e90538728de699efbaa6bbfeaa728976053384587e45d18/detection/f-01ad70e688a4eb070e90538728de699efbaa6bbfeaa728976053384587e45d18-1604018504", "category": "Payload delivery", "uuid": "431c61d2-81f7-4a85-8cd6-0e9646df7517" }, { "type": "text", "object_relation": "detection-ratio", "value": "60/70", "category": "Payload delivery", "uuid": "171dad40-a8fe-4098-a143-ab21de9c3990" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b3350403-f5e2-45ef-b079-da4b4a602c6a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "pattern": "[file:hashes.MD5 = 'e6198019719a09f18f796c3961ae75f3' AND file:hashes.SHA1 = '7ca8c0dde315c6a6c21d7ddc9186b6c522e889d9' AND file:hashes.SHA256 = '5929962b379c56626a04052bc8e983732b807c34fab6c1ac420d73a8fff9e9a6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a1b404d6-436d-4d0a-b71d-6513a816eae6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-04-06T18:32:13+00:00", "category": "Other", "uuid": "51c3eb25-edbc-4637-b95a-4dcc90360b51" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/5929962b379c56626a04052bc8e983732b807c34fab6c1ac420d73a8fff9e9a6/detection/f-5929962b379c56626a04052bc8e983732b807c34fab6c1ac420d73a8fff9e9a6-1586197933", "category": "Payload delivery", "uuid": "fb1e69a5-ada8-47ab-b157-fc682fbfc5d2" }, { "type": "text", "object_relation": "detection-ratio", "value": "9/73", "category": "Payload delivery", "uuid": "cbd191b7-bdc0-40fe-b506-162d54b5dc47" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bd1a17c8-d750-4cb6-9d25-2be9e7d6768e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "pattern": "[file:hashes.MD5 = '1f46d93baf23dec9d0073c807f1d3c5e' AND file:hashes.SHA1 = '5379ccc7ce7be52bed4e6ec6e7d7ba0a14a37e2f' AND file:hashes.SHA256 = '728a8ea36c4dcaa030c2a8674bd4b65eb636253435c5d43e74d8a176a92f7679']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ff1e3b2c-f241-4015-ad25-70421a2bc582", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-04T14:46:47+00:00", "category": "Other", "uuid": "2a9e5c34-1d46-4203-bb25-1a3b0300f42d" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/728a8ea36c4dcaa030c2a8674bd4b65eb636253435c5d43e74d8a176a92f7679/detection/f-728a8ea36c4dcaa030c2a8674bd4b65eb636253435c5d43e74d8a176a92f7679-1601822807", "category": "Payload delivery", "uuid": "47b43808-3455-48a9-a824-3ecd1dd30da7" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/70", "category": "Payload delivery", "uuid": "ce708eed-04bb-4f36-a560-604d5ec66d6f" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0a8550e5-8efd-4a4f-b363-3dca1c72adf9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "pattern": "[file:hashes.MD5 = 'f781f40b79b30368ec4b5d0843cd6ead' AND file:hashes.SHA1 = 'cf53647fd09eb0c07a6dc767b3cfabc9b5b1560d' AND file:hashes.SHA256 = 'a14e3907f7a12b56bb67b178c722d92d2ee64fb0514daadd902683c799bfdc94']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--035e778c-2641-4fce-8b5f-2125d049695e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:03+00:00", "category": "Other", "uuid": "8fe76e6a-479e-4d07-8c33-aa550e13ed03" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/a14e3907f7a12b56bb67b178c722d92d2ee64fb0514daadd902683c799bfdc94/detection/f-a14e3907f7a12b56bb67b178c722d92d2ee64fb0514daadd902683c799bfdc94-1604018883", "category": "Payload delivery", "uuid": "990a3271-6bfc-4d3e-bf52-2daa96114a1a" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "a82ff796-45e7-4556-8457-8f4e375c13ac" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c25b971a-bcba-4e8c-bfaf-0b5e6d94b9fb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "pattern": "[file:hashes.MD5 = '58294f59bdfb4a9394c3274de512f696' AND file:hashes.SHA1 = '60d339f31e464596162f3fa5344b039a96aa439e' AND file:hashes.SHA256 = 'b1798973f8dfce5777905452271f3b3ff23fb2148978ba2943654a72fe5b6387']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d20df19b-04e9-40d8-a031-3e91fa73ce1d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-18T00:09:30+00:00", "category": "Other", "uuid": "9e9344f6-9f27-4982-83c4-5c0c5f5f55ce" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b1798973f8dfce5777905452271f3b3ff23fb2148978ba2943654a72fe5b6387/detection/f-b1798973f8dfce5777905452271f3b3ff23fb2148978ba2943654a72fe5b6387-1602979770", "category": "Payload delivery", "uuid": "eb67fde1-abeb-4334-bfa2-15ea9fa0e14a" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/71", "category": "Payload delivery", "uuid": "f07ccbdc-20fc-4a36-9a13-794f60262508" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ec94d76e-bd10-4c4e-80e7-1dca0cfdbf6c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "pattern": "[file:hashes.MD5 = 'b1d1f8084148e7e221b051af4025b3db' AND file:hashes.SHA1 = '6d86ce151e0eec88f0921c74dfa702dc9cde0d61' AND file:hashes.SHA256 = '6f55f3b1415b5bf9dda57158f05fe628edb92b436887ad72f3d4bd108e8542d2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bb2c2496-37da-47ac-b78b-c312d9b49cff", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-04-06T18:32:34+00:00", "category": "Other", "uuid": "5774be8a-ecb9-401e-bb83-f17844d2236d" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/6f55f3b1415b5bf9dda57158f05fe628edb92b436887ad72f3d4bd108e8542d2/detection/f-6f55f3b1415b5bf9dda57158f05fe628edb92b436887ad72f3d4bd108e8542d2-1586197954", "category": "Payload delivery", "uuid": "0fb5a137-44fc-4bc8-b481-57fc82db24f3" }, { "type": "text", "object_relation": "detection-ratio", "value": "46/71", "category": "Payload delivery", "uuid": "aec1d767-7603-4972-aad0-580b211e8ce9" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bd495716-d98e-47e4-9809-d662914add7a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "pattern": "[file:hashes.MD5 = '46693e0208c7bacac357ec9a2d0e84f7' AND file:hashes.SHA1 = '36ea5100df30506ba8972bf2782772ffa19f2224' AND file:hashes.SHA256 = 'fb780f623a78c9b5aa8a279430731b84d0efe937ea5684f80182e4f896e8e288']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a4e3943d-0dde-454f-a5da-bfb3cfff5774", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:50:04+00:00", "category": "Other", "uuid": "36d75910-e618-432d-a6d6-0bd8d03f683a" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/fb780f623a78c9b5aa8a279430731b84d0efe937ea5684f80182e4f896e8e288/detection/f-fb780f623a78c9b5aa8a279430731b84d0efe937ea5684f80182e4f896e8e288-1604019004", "category": "Payload delivery", "uuid": "c745c37a-6eb9-44c1-8e8e-2bc05b2f7284" }, { "type": "text", "object_relation": "detection-ratio", "value": "38/71", "category": "Payload delivery", "uuid": "ac9287f3-d87a-463e-90a0-36d69b737c48" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--844f6bfd-26af-4c70-b0fb-96bcfc467213", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:22.000Z", "modified": "2020-10-30T08:56:22.000Z", "pattern": "[file:hashes.MD5 = 'bab955353674b0ffef7623a68387200e' AND file:hashes.SHA1 = '6477c1ccaa683f688d20aa8ebe3f28091d79b0be' AND file:hashes.SHA256 = '395173829ff0e957a2d8abbb3c979f470701cd3fd381e7af23b13e7573cca5c1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:22Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--20b5b91c-4222-4eb4-bcb0-1d2b5d65c5af", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-09-05T19:59:18+00:00", "category": "Other", "uuid": "8ac26dab-bdde-46ee-b2b6-91fcec241063" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/395173829ff0e957a2d8abbb3c979f470701cd3fd381e7af23b13e7573cca5c1/detection/f-395173829ff0e957a2d8abbb3c979f470701cd3fd381e7af23b13e7573cca5c1-1599335958", "category": "Payload delivery", "uuid": "850fc869-f101-4fda-9a36-c4a1185939c6" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/67", "category": "Payload delivery", "uuid": "f7400d8d-99b5-4692-8d76-a85f22c4878a" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9e938956-b84c-4ad6-b6e9-c76e7c257f19", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "pattern": "[file:hashes.MD5 = 'c0e8cf34dbf59accd38c0a52013f0a75' AND file:hashes.SHA1 = 'a14f8110b2efe79f829783b23d4eedcc9885dab2' AND file:hashes.SHA256 = '65783de1310a32a96a2f2ca60093be27ddb32562f91104d7886fac7479ad8afe']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6bdce9b4-2073-493d-affe-89faec431d92", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-28T11:48:29+00:00", "category": "Other", "uuid": "f44d9b4f-db48-43d2-8732-5c2ae798ad5e" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/65783de1310a32a96a2f2ca60093be27ddb32562f91104d7886fac7479ad8afe/detection/f-65783de1310a32a96a2f2ca60093be27ddb32562f91104d7886fac7479ad8afe-1603885709", "category": "Payload delivery", "uuid": "60ede7f5-c509-4541-91da-8935936577e1" }, { "type": "text", "object_relation": "detection-ratio", "value": "3/70", "category": "Payload delivery", "uuid": "5de803b1-5cbd-449b-b87a-b94b5aad5fd5" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1b4abf9b-20e1-4991-9a0f-fa6d85844664", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "pattern": "[file:hashes.MD5 = 'f9b5c8c713dba6084afeaee620a368a9' AND file:hashes.SHA1 = '7d9829da68093e9e360ef6b03968dda0154536d5' AND file:hashes.SHA256 = 'b1232c4080121ac93b5c6f3982f79ee1ed4238d568cefd6eb88e7dfb072f0db8']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--707daa2e-319e-4217-9e9e-66961f0944f4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:18+00:00", "category": "Other", "uuid": "84694253-5d5c-4b8a-8ffb-cfd9c1b73432" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b1232c4080121ac93b5c6f3982f79ee1ed4238d568cefd6eb88e7dfb072f0db8/detection/f-b1232c4080121ac93b5c6f3982f79ee1ed4238d568cefd6eb88e7dfb072f0db8-1604018898", "category": "Payload delivery", "uuid": "2feac803-b896-42dc-aab7-9978ab3ecf02" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/71", "category": "Payload delivery", "uuid": "4e59cc78-18ac-4268-b295-422aca73066d" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3bff3fad-617f-469b-ab76-31ef8d37182f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "pattern": "[file:hashes.MD5 = 'e6f992fb82bd0571cf0b6138bd69c75f' AND file:hashes.SHA1 = 'c949f1a58bf36a4bf9f7765adcb21d95b24866f4' AND file:hashes.SHA256 = 'bc84fa150decef8b33811a646be2fe517f2550bfa03036b8766ff338c3d37df1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--84d87567-a187-4d13-8e8e-fe4968ec7317", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-11T05:07:26+00:00", "category": "Other", "uuid": "904b3389-b0bc-47d6-a795-5bfe127744de" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/bc84fa150decef8b33811a646be2fe517f2550bfa03036b8766ff338c3d37df1/detection/f-bc84fa150decef8b33811a646be2fe517f2550bfa03036b8766ff338c3d37df1-1602392846", "category": "Payload delivery", "uuid": "fd941260-a69c-4007-9fb6-f2fe1dee1215" }, { "type": "text", "object_relation": "detection-ratio", "value": "53/69", "category": "Payload delivery", "uuid": "92d27996-67bb-427c-b220-bd60e1fb829e" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--299df689-5b87-4dfd-ace4-1a5fe47cf0ef", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "pattern": "[file:hashes.MD5 = '07b60dab4a98ea59d6dfe957fe6edae9' AND file:hashes.SHA1 = 'fd9cfed79b0ed7e0f065dc6467b2960491001253' AND file:hashes.SHA256 = '04a4a9ff0af9fde923fb8203c89be6a57a3c42a517c9d9a047fb7d4b20e24a9f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f0944434-11e8-4a3f-9db9-3712f278b0bd", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-03-27T09:42:55+00:00", "category": "Other", "uuid": "6fe0cf5e-691c-46fe-9d18-86a4436eba26" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/04a4a9ff0af9fde923fb8203c89be6a57a3c42a517c9d9a047fb7d4b20e24a9f/detection/f-04a4a9ff0af9fde923fb8203c89be6a57a3c42a517c9d9a047fb7d4b20e24a9f-1585302175", "category": "Payload delivery", "uuid": "b79021e0-7f2d-4253-b8b3-99be799ec34b" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/73", "category": "Payload delivery", "uuid": "2e5bbc97-3aae-4b1d-8291-83c432ffd47b" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--45436868-f318-44a7-80ef-cfc59e1b067a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "pattern": "[file:hashes.MD5 = '764bbc3d05a05ecd95653167592565fe' AND file:hashes.SHA1 = '4ceaa331b99619c92e751d7cd38ba46d7e9a892e' AND file:hashes.SHA256 = '22caa1e9f4b2e88b7bcd633e4e12104f4d3556c05fc4db1ee6b620a9d5fa6213']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fa571e37-157d-47a7-b2df-e512c796d8d0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-29T02:20:09+00:00", "category": "Other", "uuid": "35aa1d43-0de4-42f1-a3e2-bf27134193c2" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/22caa1e9f4b2e88b7bcd633e4e12104f4d3556c05fc4db1ee6b620a9d5fa6213/detection/f-22caa1e9f4b2e88b7bcd633e4e12104f4d3556c05fc4db1ee6b620a9d5fa6213-1603938009", "category": "Payload delivery", "uuid": "1b9dc1a5-4c2f-4253-9343-0d652a0da2c8" }, { "type": "text", "object_relation": "detection-ratio", "value": "32/70", "category": "Payload delivery", "uuid": "a0dc77b2-59f4-4917-8ebe-0d28ee69831b" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7e0b9f43-bbfe-4c48-8bed-9a88843b88f3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "pattern": "[file:hashes.MD5 = '392a2bf073cfdf09fd5d8211b8d29547' AND file:hashes.SHA1 = '65da7b2530caee779a54d7d4740988716cfe7a60' AND file:hashes.SHA256 = 'f6b74d7a2b2e2c1f2b0f088c6b5cd7d26d4d40b756e76bcb7ad06cd7c6c17ded']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--eabe87b8-0d05-49a7-8df4-7611845f7b86", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:49:42+00:00", "category": "Other", "uuid": "3c30b2c3-1cb6-4fe9-96c2-a7e75be73dc8" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/f6b74d7a2b2e2c1f2b0f088c6b5cd7d26d4d40b756e76bcb7ad06cd7c6c17ded/detection/f-f6b74d7a2b2e2c1f2b0f088c6b5cd7d26d4d40b756e76bcb7ad06cd7c6c17ded-1604018982", "category": "Payload delivery", "uuid": "c3e1014d-c66e-45eb-8fc7-66886d3c9b18" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/71", "category": "Payload delivery", "uuid": "fcd6c159-f971-4a9d-9237-b63a250718e8" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--35f19c22-bb54-4118-8e2a-a6d6b78fa536", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "pattern": "[file:hashes.MD5 = 'bf554ccf84bc6976a37d5e7c637eea58' AND file:hashes.SHA1 = '8e66e4ff03bac55716de14943757d7c0cdf11969' AND file:hashes.SHA256 = '38bfb870f8e127f2170175fdd902c0891c9a6c044d8fae6dc9e8ef6d5a9497ab']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f61a9f17-4183-432a-a0a9-34929221e1bf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-09-07T18:14:23+00:00", "category": "Other", "uuid": "9679158b-3ec1-4004-94ad-a97af26abc90" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/38bfb870f8e127f2170175fdd902c0891c9a6c044d8fae6dc9e8ef6d5a9497ab/detection/f-38bfb870f8e127f2170175fdd902c0891c9a6c044d8fae6dc9e8ef6d5a9497ab-1599502463", "category": "Payload delivery", "uuid": "f157fa68-cf76-4ba0-b4e4-08c8002bd1e1" }, { "type": "text", "object_relation": "detection-ratio", "value": "45/66", "category": "Payload delivery", "uuid": "8e3f7146-ff81-4d72-8a50-d9ebefcbadae" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9bd33707-6cad-4531-9575-2b257af4239e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "pattern": "[file:hashes.MD5 = 'f9de761a08ec8c4cb0dcf9731acf1417' AND file:hashes.SHA1 = '7b5ad0a6f29788df61388309e9725aa845528669' AND file:hashes.SHA256 = '4e4eb3f6f85c8b14003168e9cd9d82c716cf5c04f1d7cb2f003d1ca233d75eed']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:23Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--97ca49c9-5479-48e1-b609-7bbde22a44a6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:23.000Z", "modified": "2020-10-30T08:56:23.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:43:21+00:00", "category": "Other", "uuid": "c7cf5835-6f29-4a88-9b5a-43465691aed5" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/4e4eb3f6f85c8b14003168e9cd9d82c716cf5c04f1d7cb2f003d1ca233d75eed/detection/f-4e4eb3f6f85c8b14003168e9cd9d82c716cf5c04f1d7cb2f003d1ca233d75eed-1604018601", "category": "Payload delivery", "uuid": "fe5a5abe-c4e0-43b6-ac18-6ddac9d2fd2c" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/70", "category": "Payload delivery", "uuid": "1bc8a524-b380-4ccc-b9b1-aae32a625b23" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7c7d0cab-6614-4d6e-844f-b96a60b80a05", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "pattern": "[file:hashes.MD5 = '08e1863a304022bb8682799746ab2c4c' AND file:hashes.SHA1 = 'b2a0338d2c2f0bbd03fc5b8b49e040b8d6281173' AND file:hashes.SHA256 = 'af29f3aad49a10827b338f156d4f748bcd9d987f1400c52f979efcb4ef4e5e46']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e6de3c5f-55bc-47c9-9266-a8c981902df9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:12+00:00", "category": "Other", "uuid": "91695e3c-7a53-47b1-ac9e-66d7eb8233a4" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/af29f3aad49a10827b338f156d4f748bcd9d987f1400c52f979efcb4ef4e5e46/detection/f-af29f3aad49a10827b338f156d4f748bcd9d987f1400c52f979efcb4ef4e5e46-1604018892", "category": "Payload delivery", "uuid": "cd152394-4448-4963-bb4f-2d2b762f6c46" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/71", "category": "Payload delivery", "uuid": "eff997eb-5c20-447e-b42d-3668d14cf2ef" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--647f4bff-0d89-4940-b1ff-f68625083a1c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "pattern": "[file:hashes.MD5 = '04280820a670d0a8a2f0c398f7d223d7' AND file:hashes.SHA1 = 'f564a94c7833b1b8882febd28e95afba71ebadbe' AND file:hashes.SHA256 = '2cd01dab44247dee9c0f9511b3b1d11d5a69afcc87efc59446238021d5343aad']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--af3a4fd1-9f79-401b-a42c-d05b1e190cae", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:49+00:00", "category": "Other", "uuid": "7ba79838-da27-4225-b272-61ff9c4f9ce6" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/2cd01dab44247dee9c0f9511b3b1d11d5a69afcc87efc59446238021d5343aad/detection/f-2cd01dab44247dee9c0f9511b3b1d11d5a69afcc87efc59446238021d5343aad-1604018569", "category": "Payload delivery", "uuid": "a90b0e7d-8608-4b9c-a182-4b081ba7e47c" }, { "type": "text", "object_relation": "detection-ratio", "value": "62/72", "category": "Payload delivery", "uuid": "675390a3-319c-467d-b011-091fdc92ead8" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9fbbec2e-0c24-457a-b241-dd5313c196a8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "pattern": "[file:hashes.MD5 = 'cb41e35dcfd51b7ea5e55b608a380f9f' AND file:hashes.SHA1 = '323103f016f8907a4918ad0a15f0c124c68658b2' AND file:hashes.SHA256 = '70ffcd7e8663a2aab204eaea3daf86e9cff73872d23ad3da2e91382f8593501a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2fa4890a-b3e8-4140-9c6a-ced8d3f1b4a7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:43:57+00:00", "category": "Other", "uuid": "39dcea26-29d1-44b5-847a-39d032c17da8" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/70ffcd7e8663a2aab204eaea3daf86e9cff73872d23ad3da2e91382f8593501a/detection/f-70ffcd7e8663a2aab204eaea3daf86e9cff73872d23ad3da2e91382f8593501a-1604018637", "category": "Payload delivery", "uuid": "3f304bcf-61e8-4714-b1e7-d339a80dc67f" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/71", "category": "Payload delivery", "uuid": "cf5cf282-5f24-488f-aa93-080ff4da33c6" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3ad9b9d2-d784-42ae-b8c5-09d4ed4ae102", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "pattern": "[file:hashes.MD5 = '4d373fda8175a8c79e2e0dc760325634' AND file:hashes.SHA1 = '35ee421837fe02d21c5bd94da425b1f39f1d73d8' AND file:hashes.SHA256 = '062fc14064495f558e1192b675c1f0eeeb87c5ced5c01f81a38fc6b2591508d6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fcbdfa58-feca-47b8-8443-d6856341c139", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-16T02:09:45+00:00", "category": "Other", "uuid": "c50a134f-ff9f-4f27-8d47-495f6bdcc819" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/062fc14064495f558e1192b675c1f0eeeb87c5ced5c01f81a38fc6b2591508d6/detection/f-062fc14064495f558e1192b675c1f0eeeb87c5ced5c01f81a38fc6b2591508d6-1602814185", "category": "Payload delivery", "uuid": "af4f7ad6-d6db-4233-a2d6-2e315b9c0765" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/71", "category": "Payload delivery", "uuid": "fe476007-df34-4cc0-b1e0-c6f79a883d75" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7dbc825d-6f73-4c96-8b7a-8cd5a9030b0d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "pattern": "[file:hashes.MD5 = '49d508847c6982fc16ef7ccef4a327bc' AND file:hashes.SHA1 = '0be71db06cb525f058fcf4da40b84f96f1304fb7' AND file:hashes.SHA256 = 'ede75c0a88d80043f79025dfd8ef91c3d1b01a1613f4a0347b2ceb29f8b19578']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--319be5ee-9dbe-4d32-9558-174535d5eb76", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-27T20:19:39+00:00", "category": "Other", "uuid": "2e961251-18fb-4906-a715-d8a6eb35484e" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/ede75c0a88d80043f79025dfd8ef91c3d1b01a1613f4a0347b2ceb29f8b19578/detection/f-ede75c0a88d80043f79025dfd8ef91c3d1b01a1613f4a0347b2ceb29f8b19578-1603829979", "category": "Payload delivery", "uuid": "2f4e16f0-265d-470c-813b-7481cbabfdef" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/64", "category": "Payload delivery", "uuid": "b56e51c9-ba00-4940-8463-d0f180e17f77" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c60a6e18-6be9-41a5-af8b-044a261e8842", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "pattern": "[file:hashes.MD5 = '5c958dd142c5304050c1e3a31aa4d20f' AND file:hashes.SHA1 = 'a520c48f968d1134ec0c7d73835b853d81420fc7' AND file:hashes.SHA256 = 'b1eb0565b958d4819138a72cf38b16d058cfee00097461c5dad3fae500aa4296']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fec89932-b6e3-4f90-bfeb-b12aa3d8e4d6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-29T07:38:14+00:00", "category": "Other", "uuid": "123abaee-1146-4d30-9bb2-18ddb4d00912" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b1eb0565b958d4819138a72cf38b16d058cfee00097461c5dad3fae500aa4296/detection/f-b1eb0565b958d4819138a72cf38b16d058cfee00097461c5dad3fae500aa4296-1603957094", "category": "Payload delivery", "uuid": "4ec65c97-7e35-4832-98af-842054da8a04" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/71", "category": "Payload delivery", "uuid": "a866ddf2-353b-4676-9d04-ddb67548d081" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8ebdeb3d-585a-402e-ac4c-e74d4e7e28b3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "pattern": "[file:hashes.MD5 = 'd99731e275a92ae306fdbb09b5bd4d24' AND file:hashes.SHA1 = 'a36676950f35f1255935a0fc8467bb28ff625edb' AND file:hashes.SHA256 = '0856b3c06805d3935b1db325c4e9c9131572b4cf09f07d989911495807775cab']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c4ed2cef-0abb-442d-a321-7f528925ef43", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-17T00:20:39+00:00", "category": "Other", "uuid": "8ffa6185-65cb-40eb-a3c0-1369c382d63e" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/0856b3c06805d3935b1db325c4e9c9131572b4cf09f07d989911495807775cab/detection/f-0856b3c06805d3935b1db325c4e9c9131572b4cf09f07d989911495807775cab-1602894039", "category": "Payload delivery", "uuid": "252d42fd-c0b6-408a-a666-96e3165f3ffa" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/70", "category": "Payload delivery", "uuid": "df13ddd5-e4fe-4100-94f8-be3e5edf314f" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a0ba4a94-ca04-4194-8f44-7e109a1d571d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "pattern": "[file:hashes.MD5 = 'e9ca9f20398e87d807e953ccbb3ef8b2' AND file:hashes.SHA1 = '4cac60759f4c879f1d6c12dd54774554cc522350' AND file:hashes.SHA256 = '9bf2fd111962a5634e7b1a5821b08584002cf304d657840a904d3388967a9a65']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--90a85fa2-2cd3-44ed-9800-47036fbea5ed", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:47:48+00:00", "category": "Other", "uuid": "e278171b-1db7-485d-a4f0-86308b9bb575" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/9bf2fd111962a5634e7b1a5821b08584002cf304d657840a904d3388967a9a65/detection/f-9bf2fd111962a5634e7b1a5821b08584002cf304d657840a904d3388967a9a65-1604018868", "category": "Payload delivery", "uuid": "bb4afb0c-37fb-482e-9c00-504047247304" }, { "type": "text", "object_relation": "detection-ratio", "value": "60/72", "category": "Payload delivery", "uuid": "3755cfcf-372d-4a80-a89e-ee4b43bb2bc8" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--448163b9-d56e-4197-b219-7701771f0b9f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "pattern": "[file:hashes.MD5 = '81530582c3bf6e5e34a33f5d539b83a0' AND file:hashes.SHA1 = 'f1fd8e3a214647617d24c663ab69df6ab491dfdb' AND file:hashes.SHA256 = 'c9ffb0e9c3df23bba54debf0f6875ade683fe29f4ca720d2abc780179a2781cf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--edf1b1b2-a646-4d36-89fc-2bd73036558a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-23T08:40:45+00:00", "category": "Other", "uuid": "0309a831-48af-4f90-bedf-09c51893f95b" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/c9ffb0e9c3df23bba54debf0f6875ade683fe29f4ca720d2abc780179a2781cf/detection/f-c9ffb0e9c3df23bba54debf0f6875ade683fe29f4ca720d2abc780179a2781cf-1603442445", "category": "Payload delivery", "uuid": "a9796062-2900-4096-a6fa-d14d530cce0f" }, { "type": "text", "object_relation": "detection-ratio", "value": "47/71", "category": "Payload delivery", "uuid": "248935ae-13a4-46fb-ad5b-1d27398dc084" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--e9731d60-0ae4-4dde-898e-cac8b04a92ae", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:24.000Z", "modified": "2020-10-30T08:56:24.000Z", "pattern": "[file:hashes.MD5 = '9bc53f708e95adaeab0fbacce4738d1e' AND file:hashes.SHA1 = 'c4bfc6c7e6591166cee8ded217083ad28b0f7d9a' AND file:hashes.SHA256 = '11d2e042f172811cd155e07a8f7a3830e590997b87be68cd9b076477bbc98dcd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:24Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e6bc3456-c3f9-4350-acc0-327d026ebb77", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:07+00:00", "category": "Other", "uuid": "8d0de787-53a5-4843-84fc-5888c683a7b1" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/11d2e042f172811cd155e07a8f7a3830e590997b87be68cd9b076477bbc98dcd/detection/f-11d2e042f172811cd155e07a8f7a3830e590997b87be68cd9b076477bbc98dcd-1604018527", "category": "Payload delivery", "uuid": "f890843d-0114-47b3-8b42-ee86f4e1f51f" }, { "type": "text", "object_relation": "detection-ratio", "value": "45/72", "category": "Payload delivery", "uuid": "f7995bab-bf45-47b8-9cec-75c583699b84" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--398aa11c-cf88-4719-8a67-281a237f5842", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "pattern": "[file:hashes.MD5 = '256fa0ae50b4e199b631047f2fe98b58' AND file:hashes.SHA1 = 'bb94ba05b6daa07443ab330815a6fc074c8d326b' AND file:hashes.SHA256 = '429650c8e59459c0150ad5cb8853cb46415b70afb92f45ebc04e8c5fbd382bf2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--06b39d87-d102-40a2-be42-99983372e8c2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-14T07:38:14+00:00", "category": "Other", "uuid": "84dfb00e-fba2-4575-96f1-0dbd7a035571" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/429650c8e59459c0150ad5cb8853cb46415b70afb92f45ebc04e8c5fbd382bf2/detection/f-429650c8e59459c0150ad5cb8853cb46415b70afb92f45ebc04e8c5fbd382bf2-1602661094", "category": "Payload delivery", "uuid": "583a6d86-6fca-4789-b9f4-26f8061bcd3e" }, { "type": "text", "object_relation": "detection-ratio", "value": "43/71", "category": "Payload delivery", "uuid": "06f907e1-c8e8-4835-9a22-1800e977b425" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--5df60d5d-8222-40a0-8283-c1b60986313f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "pattern": "[file:hashes.MD5 = 'a5e2a191fb0b2dfb336147da0b6cabb6' AND file:hashes.SHA1 = 'cecff6847d1b04b05ecf6e965fcd0b2b800aa212' AND file:hashes.SHA256 = 'dd913d2b8a29eae792097e2d2b81a94e62b3e90636a9564f56dc302b50901ccb']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5b646f32-311e-4fe3-b55f-ba211ee379fc", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-06-11T10:18:21+00:00", "category": "Other", "uuid": "a99df7e6-664e-48a8-9eec-c42af8d43451" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/dd913d2b8a29eae792097e2d2b81a94e62b3e90636a9564f56dc302b50901ccb/detection/f-dd913d2b8a29eae792097e2d2b81a94e62b3e90636a9564f56dc302b50901ccb-1591870701", "category": "Payload delivery", "uuid": "29298e01-3b55-4adf-8aa9-44e78bc32e35" }, { "type": "text", "object_relation": "detection-ratio", "value": "27/61", "category": "Payload delivery", "uuid": "75391fa9-d5a3-47fe-a79b-1ea0891129f4" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0657a83d-6055-4d0e-b18c-e66524986913", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "pattern": "[file:hashes.MD5 = '2237dd795e50a6d4ef1bd3bafa8c771f' AND file:hashes.SHA1 = '366ff7faca817fb6c99650abdfbf14b8eca11fda' AND file:hashes.SHA256 = '5b02e00797b0f396b40dbb8223d034a7aa42798a39a89a41ea70a314ceab478e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--486237b5-0bca-4be0-b0a9-cf97bad7ec7e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:43:32+00:00", "category": "Other", "uuid": "f8c9d9ea-47cb-4079-8a72-af10bcae830a" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/5b02e00797b0f396b40dbb8223d034a7aa42798a39a89a41ea70a314ceab478e/detection/f-5b02e00797b0f396b40dbb8223d034a7aa42798a39a89a41ea70a314ceab478e-1604018612", "category": "Payload delivery", "uuid": "976cb65e-22c8-4596-b46d-98d585378da2" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/71", "category": "Payload delivery", "uuid": "e465d5a8-2d83-463b-857f-97e8fe554f2f" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8ff99259-70f6-4ec1-8b53-ec2640ff4f76", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "pattern": "[file:hashes.MD5 = 'ad3ae77f1d1c840eb990bd453be517ab' AND file:hashes.SHA1 = '54cf984207163b9d6dd00d005c8462318caa4539' AND file:hashes.SHA256 = '8ddf1b190498bcc66f510005f0e1efc2562e189887924ddb7e584f04437e78a2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8e77f1b3-ff7e-4e6d-ad68-6908c1a0961d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:47:32+00:00", "category": "Other", "uuid": "66348970-4506-4c5e-bfe9-033ad376135f" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/8ddf1b190498bcc66f510005f0e1efc2562e189887924ddb7e584f04437e78a2/detection/f-8ddf1b190498bcc66f510005f0e1efc2562e189887924ddb7e584f04437e78a2-1604018852", "category": "Payload delivery", "uuid": "b1456ad4-1a55-4966-919c-7362d866f3a8" }, { "type": "text", "object_relation": "detection-ratio", "value": "60/71", "category": "Payload delivery", "uuid": "e0a0d437-07c1-4238-8e8f-37ad55795f6b" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2e76b14d-770a-4609-b3b5-b5ea2d40411f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "pattern": "[file:hashes.MD5 = 'fa9ba530572d4b8ad6db01097244beff' AND file:hashes.SHA1 = 'abb546c55e6503639dabc61e1434a26c624bb485' AND file:hashes.SHA256 = 'ad0ee372226ace062473e01b15b52d99eb61a6f3b265bead8f2c534f75d05cea']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--afab1a16-e49a-41dc-8cb3-00b0eb5056e1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:07+00:00", "category": "Other", "uuid": "ea82c6f0-bb64-4652-bd71-5507c9b6649f" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/ad0ee372226ace062473e01b15b52d99eb61a6f3b265bead8f2c534f75d05cea/detection/f-ad0ee372226ace062473e01b15b52d99eb61a6f3b265bead8f2c534f75d05cea-1604018887", "category": "Payload delivery", "uuid": "05e314a1-9863-449c-9c22-0e6c2cc8f8a6" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/70", "category": "Payload delivery", "uuid": "6da020ba-c20e-427b-9256-dfc06bcd99f9" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3ef484d7-e18a-4268-9d64-57a0dc11ec90", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "pattern": "[file:hashes.MD5 = '7c4c9a6c3fff239b2d1bd831782c6467' AND file:hashes.SHA1 = '3d74c77cb0fb25f578876b6182f585e61038634a' AND file:hashes.SHA256 = '1f9194a46385dfef7bd1098b3c5da2b8f2d2552c9c1d1b6bf3f7313ee970b9a4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--23503f7a-ba91-4d93-aace-c0bfd9228e8a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2019-11-09T01:32:17+00:00", "category": "Other", "uuid": "dbc84ddc-a27e-441b-8558-d31c8e0158da" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/1f9194a46385dfef7bd1098b3c5da2b8f2d2552c9c1d1b6bf3f7313ee970b9a4/detection/f-1f9194a46385dfef7bd1098b3c5da2b8f2d2552c9c1d1b6bf3f7313ee970b9a4-1573263137", "category": "Payload delivery", "uuid": "972bda52-0c0a-471c-8778-881b14362c4d" }, { "type": "text", "object_relation": "detection-ratio", "value": "2/58", "category": "Payload delivery", "uuid": "12146634-cbbf-496f-bec2-cf11729ca45b" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--20f652f2-5da6-4d98-a7ab-ca7e2f1a46d2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "pattern": "[file:hashes.MD5 = '6f29331e3d016c428b92b6e7ae3132d6' AND file:hashes.SHA1 = '2fa9889c4e5da3c5ec5fa29e428ec1303992bf0b' AND file:hashes.SHA256 = '25f051fad96d0996708561ce734bb836c4a576f8cb4d6f96927975a08eff9e19']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2891de56-5536-4798-beb4-ebe8f7d526f6", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:41+00:00", "category": "Other", "uuid": "be59f203-2657-4807-96fe-733b4e7fafe2" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/25f051fad96d0996708561ce734bb836c4a576f8cb4d6f96927975a08eff9e19/detection/f-25f051fad96d0996708561ce734bb836c4a576f8cb4d6f96927975a08eff9e19-1604018561", "category": "Payload delivery", "uuid": "cd554aa1-a4f2-4800-a252-206ff91ec127" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/71", "category": "Payload delivery", "uuid": "5f791c67-4ca2-42fd-8caf-103d1f0c6eee" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--94194fbd-1c7b-48a3-9397-78690a14965c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "pattern": "[file:hashes.MD5 = '86fb97cd68d2f5c9681be20f1929c474' AND file:hashes.SHA1 = '1ba763f86f620b9bbc96f4d8a45afb4e6176b3e5' AND file:hashes.SHA256 = 'bc08bc584b06c8866c6b4feeeef745e187a8ce0e924d159d5044e6368e4bf31a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--11e9099a-5624-4972-a948-fedaf267e4e4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:48+00:00", "category": "Other", "uuid": "0a5d532c-b7b3-41b1-8b13-24ee95a0e993" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/bc08bc584b06c8866c6b4feeeef745e187a8ce0e924d159d5044e6368e4bf31a/detection/f-bc08bc584b06c8866c6b4feeeef745e187a8ce0e924d159d5044e6368e4bf31a-1604018928", "category": "Payload delivery", "uuid": "f7f1dba2-cc5e-49da-9197-a8e1305519b5" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/70", "category": "Payload delivery", "uuid": "a760edb6-99b8-4060-a459-2828446beb64" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--da3156db-d5bd-42c1-8acf-fcba17565f99", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "pattern": "[file:hashes.MD5 = 'af09099729962f25c57cc35e86bfbcf9' AND file:hashes.SHA1 = '42333bd6cbe20c64b7cb1b81bcc6110151bae7ea' AND file:hashes.SHA256 = 'b91b4d45b41d0d0ca1bdfac917c4cd732d32754bcfd7590ac521dc4fe414ebd5']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--3c47eb42-f907-41c4-a214-ea3bea07bad4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:36+00:00", "category": "Other", "uuid": "eb234e22-7d05-4a32-8e34-7eab8b9590c8" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b91b4d45b41d0d0ca1bdfac917c4cd732d32754bcfd7590ac521dc4fe414ebd5/detection/f-b91b4d45b41d0d0ca1bdfac917c4cd732d32754bcfd7590ac521dc4fe414ebd5-1604018916", "category": "Payload delivery", "uuid": "f876239e-3ee3-40b8-a6c4-c8b442584b98" }, { "type": "text", "object_relation": "detection-ratio", "value": "55/69", "category": "Payload delivery", "uuid": "aa4c835e-55c7-4a4b-a6f5-74022cf5a8e5" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c6b32ce3-eb60-458e-a9c4-79c6323bf988", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:25.000Z", "modified": "2020-10-30T08:56:25.000Z", "pattern": "[file:hashes.MD5 = '7b5e870565f0563abe7e4150969f52de' AND file:hashes.SHA1 = '7f727a5f02359e44ad075053fb4dfcc55c83dccc' AND file:hashes.SHA256 = '8dde9b01b0e4eb47afff7daf5d59abf72e68ec6d944a9404f78ba69fcbd5310d']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:25Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a3ed0c52-f5a7-4eca-b69d-7e6c7df2c44f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-06-27T21:52:44+00:00", "category": "Other", "uuid": "073ab999-e864-407b-9b87-6f17724df733" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/8dde9b01b0e4eb47afff7daf5d59abf72e68ec6d944a9404f78ba69fcbd5310d/detection/f-8dde9b01b0e4eb47afff7daf5d59abf72e68ec6d944a9404f78ba69fcbd5310d-1593294764", "category": "Payload delivery", "uuid": "760a3e42-29a1-4d66-8922-7dded1d3bdcd" }, { "type": "text", "object_relation": "detection-ratio", "value": "2/63", "category": "Payload delivery", "uuid": "91c57ecf-17d5-46ab-bbc7-3f658c5df3d4" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d2983ca3-9223-4a87-b04f-6de51ace37a7", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "pattern": "[file:hashes.MD5 = '7767c187579466c4d9527291c20664c5' AND file:hashes.SHA1 = '6dc993b4db27a3c12895bf804e0237f2cba40473' AND file:hashes.SHA256 = '9e99facf8ea4c39a5d2bfc404fbae99b37bae36ab589a2a67acf23d03de96512']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--eab302f5-7a18-4f5e-b606-4a7411472846", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:47:58+00:00", "category": "Other", "uuid": "16c23d69-bfff-4100-849d-216b02d4e902" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/9e99facf8ea4c39a5d2bfc404fbae99b37bae36ab589a2a67acf23d03de96512/detection/f-9e99facf8ea4c39a5d2bfc404fbae99b37bae36ab589a2a67acf23d03de96512-1604018878", "category": "Payload delivery", "uuid": "95587d79-5287-4520-807f-5a8569a1dc39" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/71", "category": "Payload delivery", "uuid": "ec9a9044-118d-4a67-8bc6-4af354cd9f8d" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--522f5599-7a15-4eaf-bc74-74ad5dd77996", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "pattern": "[file:hashes.MD5 = 'feb6a6bac205b0baf0bdab6bd405110f' AND file:hashes.SHA1 = '1baab9662c1f71e5406897804837b45f78e14682' AND file:hashes.SHA256 = 'ab99e91e1b0951feabd09d049e0ac9d9412c67603415c10cbeadde5842ca02d2']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--4cd9d948-55ef-4f84-8e84-b0eb3b3f63f8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-11T08:29:42+00:00", "category": "Other", "uuid": "9b395ce4-e2e4-4845-b89f-6a9a8adbd38f" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/ab99e91e1b0951feabd09d049e0ac9d9412c67603415c10cbeadde5842ca02d2/detection/f-ab99e91e1b0951feabd09d049e0ac9d9412c67603415c10cbeadde5842ca02d2-1602404982", "category": "Payload delivery", "uuid": "db52503b-934d-40ac-97de-f1db9d50f9f1" }, { "type": "text", "object_relation": "detection-ratio", "value": "39/69", "category": "Payload delivery", "uuid": "cc24a489-0b12-45fe-a5c4-be53c86006ab" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--590167ef-b668-496f-8970-7bd7d16826bf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "pattern": "[file:hashes.MD5 = 'f4bf1dd766e2354af3952d9b1ef26d88' AND file:hashes.SHA1 = 'a898cf3d79cece3948d148b301551ae4543dda74' AND file:hashes.SHA256 = 'b95be82b7682341cf7e2b8e33f1ca0c8915ee005bd71c50ad877da99c7ec39f6']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a8374917-93c1-457e-996e-c942d50f31d3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:40+00:00", "category": "Other", "uuid": "37386646-cdf7-456b-8a30-6c7d83da164c" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b95be82b7682341cf7e2b8e33f1ca0c8915ee005bd71c50ad877da99c7ec39f6/detection/f-b95be82b7682341cf7e2b8e33f1ca0c8915ee005bd71c50ad877da99c7ec39f6-1604018920", "category": "Payload delivery", "uuid": "4955ff52-47a2-4d3a-9012-519140c847eb" }, { "type": "text", "object_relation": "detection-ratio", "value": "39/72", "category": "Payload delivery", "uuid": "4f298413-dca7-4ef5-97a3-6b245c8672c2" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1f2972d3-a2b9-4e33-b097-362ad59cf22a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "pattern": "[file:hashes.MD5 = '7430f8e3f9f8716b8dbc548997ad8f8a' AND file:hashes.SHA1 = '7062cd7b0e0d3eef423e20aef39fb330faf88717' AND file:hashes.SHA256 = '4544b478b2029ec38eb4bda111741a10f0684e38f1b29ce092b93df882d11f9e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ea2bb670-0be4-494b-8513-325713ffa7b3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-27T14:40:08+00:00", "category": "Other", "uuid": "fbc1e04c-f4b3-4754-a382-b20fef186300" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/4544b478b2029ec38eb4bda111741a10f0684e38f1b29ce092b93df882d11f9e/detection/f-4544b478b2029ec38eb4bda111741a10f0684e38f1b29ce092b93df882d11f9e-1603809608", "category": "Payload delivery", "uuid": "7c9b89f4-c0ef-4aa2-ad08-b325518e6228" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/62", "category": "Payload delivery", "uuid": "82a63625-ad77-49ee-a9ce-a8aa7dbbae14" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--878ff7cd-c5c0-4ad7-a9fc-9fac552d4b7a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "pattern": "[file:hashes.MD5 = '6c6846b436ec85b9179ad77fb585e20c' AND file:hashes.SHA1 = '4d75fd0ece50bb305a34db32157da76c7fa1ef1a' AND file:hashes.SHA256 = 'f9c459824e223d5523ac6edfea7b842cf168ae135045258b04b4760f4002a86f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--7529b90e-54c5-43da-858e-524ab68604bb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-07T12:07:29+00:00", "category": "Other", "uuid": "8476a6d5-26db-456d-ba55-f54d3fe89455" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/f9c459824e223d5523ac6edfea7b842cf168ae135045258b04b4760f4002a86f/detection/f-f9c459824e223d5523ac6edfea7b842cf168ae135045258b04b4760f4002a86f-1602072449", "category": "Payload delivery", "uuid": "9cdc41fa-b0c7-40d7-b9e9-b6a14716bfdf" }, { "type": "text", "object_relation": "detection-ratio", "value": "36/69", "category": "Payload delivery", "uuid": "c6a285b5-f6ef-41a9-af41-688c9525119b" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--d7304186-e248-49e9-a821-d4e1b2bfff31", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "pattern": "[file:hashes.MD5 = '4988b2bd0ba2e100a40d76ae0b4dea94' AND file:hashes.SHA1 = 'fe19be43f9628298e158b7f392953be4e4468043' AND file:hashes.SHA256 = '484418a9516fbe04de0d99704ac521b04825bfdbc4abbcbf1ba88a28c26373ea']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--2f5b67f5-2eb1-45a4-8067-e0619f071a9a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-18T14:36:57+00:00", "category": "Other", "uuid": "916db53f-f107-4404-8ca1-30ba978697f8" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/484418a9516fbe04de0d99704ac521b04825bfdbc4abbcbf1ba88a28c26373ea/detection/f-484418a9516fbe04de0d99704ac521b04825bfdbc4abbcbf1ba88a28c26373ea-1603031817", "category": "Payload delivery", "uuid": "c2130ec6-72f1-43d0-a477-8dd8ef70cc79" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/71", "category": "Payload delivery", "uuid": "0e406f20-f95f-4ab2-a1be-11663a3a1dfd" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--bcb35d45-3b99-4de3-952c-eaccba4124e5", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "pattern": "[file:hashes.MD5 = 'd14e7a1d3a56511c164c36077777c2da' AND file:hashes.SHA1 = 'f9ae4e7d956d29fd9564316fc2584e47c02501cc' AND file:hashes.SHA256 = '5fc95870132e4709a5a0086593490cd04eb121f2f238b44cb19679125e842115']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ec28b665-f612-473f-9512-fd6f869b06fe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-09-05T07:21:27+00:00", "category": "Other", "uuid": "39c8ae20-222b-4bcf-8471-200d6051079d" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/5fc95870132e4709a5a0086593490cd04eb121f2f238b44cb19679125e842115/detection/f-5fc95870132e4709a5a0086593490cd04eb121f2f238b44cb19679125e842115-1599290487", "category": "Payload delivery", "uuid": "3c9cb887-2d4f-42e0-9190-4ccc1621fe8d" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/69", "category": "Payload delivery", "uuid": "21a268ec-7a0d-4f90-975d-f983c234cb86" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8e934a55-9f8c-431c-85c8-f52a2574eb6d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "pattern": "[file:hashes.MD5 = 'c8777183e31a2aaa6b30f9d2d2103fd3' AND file:hashes.SHA1 = '356277603cf3cbc777811069fc631c66874901cb' AND file:hashes.SHA256 = '798d9d960b1a6dba959831983573ce7de2ea376f13f1e0fe7968beeca37f0540']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--93b3d657-1591-445c-9a59-22b998db2f98", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-27T04:38:13+00:00", "category": "Other", "uuid": "d467b1ce-0575-4a9c-bd2e-97cf6a84ae2f" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/798d9d960b1a6dba959831983573ce7de2ea376f13f1e0fe7968beeca37f0540/detection/f-798d9d960b1a6dba959831983573ce7de2ea376f13f1e0fe7968beeca37f0540-1603773493", "category": "Payload delivery", "uuid": "a4ec54bf-13d0-4a1d-b0a1-f680cf2c0e55" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/66", "category": "Payload delivery", "uuid": "464db131-2f52-4f34-a556-5ba4000842ca" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--61def0f6-fcdb-4c6c-9557-89fa5c3fd142", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "pattern": "[file:hashes.MD5 = '91f49d454a066e0acacac21083a2f300' AND file:hashes.SHA1 = '9f594478d57301f42bb766211106464cbcf9476e' AND file:hashes.SHA256 = 'b62ba19f3f6ab6200a764a14a268cbf21efe3b48030f7a8bccd96300d56ec950']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:26Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--bb4fb207-7951-414d-ac6c-cc6ab057787c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:26.000Z", "modified": "2020-10-30T08:56:26.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-09-06T08:12:29+00:00", "category": "Other", "uuid": "02b86361-900f-4e64-9c46-46945e74f6f6" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/b62ba19f3f6ab6200a764a14a268cbf21efe3b48030f7a8bccd96300d56ec950/detection/f-b62ba19f3f6ab6200a764a14a268cbf21efe3b48030f7a8bccd96300d56ec950-1599379949", "category": "Payload delivery", "uuid": "e3b336c8-271d-4581-9323-51095080240d" }, { "type": "text", "object_relation": "detection-ratio", "value": "50/69", "category": "Payload delivery", "uuid": "d53bdb2e-25b5-4b18-8f63-e708247b2806" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3688243c-dba5-4425-83df-05469b53270e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "pattern": "[file:hashes.MD5 = 'acebea7d95a9c8d8e2fa4ba538600be1' AND file:hashes.SHA1 = '9a36a1ec630cd5d0451d84b214f89d9bf867b394' AND file:hashes.SHA256 = 'ca8d8d55c30ed37ce1bc36e514a3fee5b0bc00ef5c88b8d07d51dbd9a141ff33']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--83e74766-26ae-4c43-b22c-d0f6f6871b9a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:49:01+00:00", "category": "Other", "uuid": "4b475d1e-a798-4d26-8ccd-a8ede4f8ad8f" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/ca8d8d55c30ed37ce1bc36e514a3fee5b0bc00ef5c88b8d07d51dbd9a141ff33/detection/f-ca8d8d55c30ed37ce1bc36e514a3fee5b0bc00ef5c88b8d07d51dbd9a141ff33-1604018941", "category": "Payload delivery", "uuid": "9cf0192d-a985-496f-9a54-560870718976" }, { "type": "text", "object_relation": "detection-ratio", "value": "60/72", "category": "Payload delivery", "uuid": "cd29c8ce-01c3-4865-95a4-57569772192f" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9da3fb39-1b7f-45b9-9c2b-18f02edb7a13", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "pattern": "[file:hashes.MD5 = '4a31d5f7e10f8113099a0d898c4ebc40' AND file:hashes.SHA1 = '973ccbdc3b5ea8e0588df797b688b62687a7d35d' AND file:hashes.SHA256 = '15fcb756a05b69518be5e32b98b25f398e999d4ec971364fe01f9dd0f78747e3']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--984012d5-eb26-486d-ba47-720d981b8305", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:13+00:00", "category": "Other", "uuid": "3db07e20-8764-4836-9895-fa52de863d5c" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/15fcb756a05b69518be5e32b98b25f398e999d4ec971364fe01f9dd0f78747e3/detection/f-15fcb756a05b69518be5e32b98b25f398e999d4ec971364fe01f9dd0f78747e3-1604018533", "category": "Payload delivery", "uuid": "289f526d-eb73-4818-abea-6cb92221caf7" }, { "type": "text", "object_relation": "detection-ratio", "value": "61/71", "category": "Payload delivery", "uuid": "a15c0d04-cf12-457f-8451-dae9adc076cb" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8c2d5422-b02d-4ad5-9eda-e19b2f8520d3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "pattern": "[file:hashes.MD5 = '8e473a4c59419617eda8596a4f88c050' AND file:hashes.SHA1 = '86b85612ebe92fddbb8acdb81a23b3d9edba3cbc' AND file:hashes.SHA256 = '8a4515c285fd0779292f0ac7d08f6bb5b6fca00a23ce98133e52625ee11bbf36']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1d8386a5-94a3-418f-bd81-ba11f4d870fe", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:44:35+00:00", "category": "Other", "uuid": "04da050f-984a-4081-846e-433c0d71cf62" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/8a4515c285fd0779292f0ac7d08f6bb5b6fca00a23ce98133e52625ee11bbf36/detection/f-8a4515c285fd0779292f0ac7d08f6bb5b6fca00a23ce98133e52625ee11bbf36-1604018675", "category": "Payload delivery", "uuid": "9e38efa0-b5f6-43c5-84a8-1224c1a4ec2e" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/70", "category": "Payload delivery", "uuid": "5aea5a74-a12f-43d5-9916-2faab7c86e04" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7e5e847c-9c77-4184-8d70-9c5e59739b82", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "pattern": "[file:hashes.MD5 = '23f82c716239d61c91bbf190621c1ce1' AND file:hashes.SHA1 = '3951accff0d6f75164ca256f8f070240d6806370' AND file:hashes.SHA256 = 'd6f97c6dbe021f02adb2139fc990996ca0d670ceab0189017e69171298ea9c27']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--cb350869-f30b-4548-bd9f-9835eba3747a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-03-30T18:26:54+00:00", "category": "Other", "uuid": "3b6936e9-79d9-4526-86d4-dd4d5884ec94" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/d6f97c6dbe021f02adb2139fc990996ca0d670ceab0189017e69171298ea9c27/detection/f-d6f97c6dbe021f02adb2139fc990996ca0d670ceab0189017e69171298ea9c27-1585592814", "category": "Payload delivery", "uuid": "2328b7fe-33f1-4e49-ab65-ea800d03ae75" }, { "type": "text", "object_relation": "detection-ratio", "value": "40/72", "category": "Payload delivery", "uuid": "888a7681-bae1-4270-b4ad-5522ad6bdfda" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0cf779f9-164d-457d-ad04-ea623e3076d3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "pattern": "[file:hashes.MD5 = 'b75840aa5b36fe12522f785561a03521' AND file:hashes.SHA1 = '2989b2650ba134e3a2ea31108f0c9f7c61817069' AND file:hashes.SHA256 = 'ffd51f3de4ba08508ca7c19dd15676c2c8f4a61891c1dea297bb648633485bcd']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--1197e5b8-cd16-493f-a5b8-8f9491c300f9", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-27T12:07:53+00:00", "category": "Other", "uuid": "cb6d6d31-f747-47cc-ab5e-49bf81b8a260" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/ffd51f3de4ba08508ca7c19dd15676c2c8f4a61891c1dea297bb648633485bcd/detection/f-ffd51f3de4ba08508ca7c19dd15676c2c8f4a61891c1dea297bb648633485bcd-1603800473", "category": "Payload delivery", "uuid": "74bc5fdf-c2b7-4f1e-893e-f4dd7c85cfea" }, { "type": "text", "object_relation": "detection-ratio", "value": "37/64", "category": "Payload delivery", "uuid": "2e5f82e4-a075-4222-9c1f-98226159fec8" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--7169c4a0-202c-4276-aa95-4209b3d9e92a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "pattern": "[file:hashes.MD5 = '4d79c23c41794ed2ea6ce6283184fecd' AND file:hashes.SHA1 = 'c655380d880dc254bf0303ecdebd21be2019fea3' AND file:hashes.SHA256 = '31045ab2d2e8f7074e2d0f312b4b79387a6794c4455100d501f6c5ea220ad207']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--ac2f44f8-9449-4acb-8612-7068a7fb9c88", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-06T14:08:37+00:00", "category": "Other", "uuid": "8bf7424f-f459-4e76-8dad-a86746af8456" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/31045ab2d2e8f7074e2d0f312b4b79387a6794c4455100d501f6c5ea220ad207/detection/f-31045ab2d2e8f7074e2d0f312b4b79387a6794c4455100d501f6c5ea220ad207-1601993317", "category": "Payload delivery", "uuid": "5ccd5b97-a9ee-46e0-9d53-b186f78b5d65" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/70", "category": "Payload delivery", "uuid": "ce9a88a4-8d24-4ec4-b4dd-bc3d64b773a7" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--39872eaa-fca6-44e8-942d-07104ec61f98", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "pattern": "[file:hashes.MD5 = 'd80015cfd1b5b289440b2e81f2061519' AND file:hashes.SHA1 = '9fbff4c08b3cdd8cd47a1c4980c94115693d85e8' AND file:hashes.SHA256 = 'e1e154590062bab331805d1657cbdea323053e25e0c5efe4a93d2deeca689452']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b5a4ef02-e2a8-4ff5-941f-82a9b7be9f9b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-16T11:08:53+00:00", "category": "Other", "uuid": "f5bfdb31-2ab7-476c-928f-f6fb0a862416" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/e1e154590062bab331805d1657cbdea323053e25e0c5efe4a93d2deeca689452/detection/f-e1e154590062bab331805d1657cbdea323053e25e0c5efe4a93d2deeca689452-1602846533", "category": "Payload delivery", "uuid": "c1c459cf-7b59-41c5-92c1-ad98b44737a8" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/71", "category": "Payload delivery", "uuid": "9acd1e67-9aab-4ca7-a58e-e7591849d622" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--85318a94-ab67-4089-9af3-32be44d7c131", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "pattern": "[file:hashes.MD5 = '854505042c28adc1a3e610ffc46950d7' AND file:hashes.SHA1 = '7b57bb7de7c50dd430938f4355797b4d1a5de299' AND file:hashes.SHA256 = '9e513f9876410f792a0f97c8bead2122c9f26cf07136fe8afbac8da48120953b']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--259af175-f2fb-4292-ba82-692fb829126d", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-27T04:37:39+00:00", "category": "Other", "uuid": "6be03700-a6cd-4d09-aa6a-14f6275beb4a" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/9e513f9876410f792a0f97c8bead2122c9f26cf07136fe8afbac8da48120953b/detection/f-9e513f9876410f792a0f97c8bead2122c9f26cf07136fe8afbac8da48120953b-1603773459", "category": "Payload delivery", "uuid": "b98fe712-bb62-4678-aa60-305fe1910982" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/61", "category": "Payload delivery", "uuid": "9d1f63b2-f72b-4970-a2ee-b264fd935afd" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--b16b9ea1-7e8a-4dd7-ace1-1ce87d453a89", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "pattern": "[file:hashes.MD5 = '45c4e9677ac5daf4c2e37228e98b09a4' AND file:hashes.SHA1 = 'edd5de852d87da23bfbca2625de7d40010cbc053' AND file:hashes.SHA256 = '60a45919ec5e67c2843fd08745f26437934ae3ceae76133a23aa0690d6a72f86']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:27Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--a5ae663f-2dfa-4b90-bc5d-ead300eb2441", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:27.000Z", "modified": "2020-10-30T08:56:27.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T06:19:02+00:00", "category": "Other", "uuid": "4078cbb1-a6d0-4b75-a5e7-f6673ed04199" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/60a45919ec5e67c2843fd08745f26437934ae3ceae76133a23aa0690d6a72f86/detection/f-60a45919ec5e67c2843fd08745f26437934ae3ceae76133a23aa0690d6a72f86-1604038742", "category": "Payload delivery", "uuid": "74158aed-febe-4986-8296-548438e1de11" }, { "type": "text", "object_relation": "detection-ratio", "value": "57/71", "category": "Payload delivery", "uuid": "09cbca5a-16b5-4ffb-a49d-b767acf7e3a4" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4bada252-c578-43d6-9196-94b816fd373e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = 'f7ee8811189110a112ea32aa64eba823' AND file:hashes.SHA1 = 'b302c4b84b82190b3d15f8c7788108a13859319d' AND file:hashes.SHA256 = '93193c90f568ae1ebdbdd5607c00ce250f6c886cec60724bdcf5e25c6ba82554']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--59a33fb7-bbfb-4df0-bade-05bd106312c2", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:47:36+00:00", "category": "Other", "uuid": "356182a0-230b-4c27-8fbe-78bed2970b9d" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/93193c90f568ae1ebdbdd5607c00ce250f6c886cec60724bdcf5e25c6ba82554/detection/f-93193c90f568ae1ebdbdd5607c00ce250f6c886cec60724bdcf5e25c6ba82554-1604018856", "category": "Payload delivery", "uuid": "8632bb68-3991-4e9c-9971-8c84dbc0e6f3" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/70", "category": "Payload delivery", "uuid": "608bbc6f-f669-4b37-9f8a-10affadb6591" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c09dc808-4138-4d16-9516-df61205371e0", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = '7d1504013c7f23e592691f90e6b2b2d5' AND file:hashes.SHA1 = '8bcad2a2ec67a4ad7501c67ae381986e4fd7e323' AND file:hashes.SHA256 = 'bb412455c3988a845ee04cd9f665df285bb00dfb62af377ff9a06d6f032e3aa1']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--56d3a112-940d-4480-85de-d34f6cd6ebdb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-12T08:13:38+00:00", "category": "Other", "uuid": "b55f9e53-3ee3-42dd-8397-94825ce86a56" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/bb412455c3988a845ee04cd9f665df285bb00dfb62af377ff9a06d6f032e3aa1/detection/f-bb412455c3988a845ee04cd9f665df285bb00dfb62af377ff9a06d6f032e3aa1-1602490418", "category": "Payload delivery", "uuid": "f8b4602d-954e-4e04-bd08-8427590e210a" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/70", "category": "Payload delivery", "uuid": "a746028b-3fea-48ae-9724-636d791eb419" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3b583c88-393d-49f8-9b29-3773a8ee7f92", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = '2beab2a02d798705e18ea0394898a2b6' AND file:hashes.SHA1 = 'e30bc0c5527bc08bf8e72216ffb7ddca785b4ef5' AND file:hashes.SHA256 = '9dce80e3b848c6a52a89e89b4d8904635a7a0a6a069f6c164b2becb5eda4d814']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--5fb79bae-c985-40ec-822e-48bcd90ef8f8", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:47:54+00:00", "category": "Other", "uuid": "e2a34e40-269a-4bd9-810c-67f2570642e1" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/9dce80e3b848c6a52a89e89b4d8904635a7a0a6a069f6c164b2becb5eda4d814/detection/f-9dce80e3b848c6a52a89e89b4d8904635a7a0a6a069f6c164b2becb5eda4d814-1604018874", "category": "Payload delivery", "uuid": "7e7aa370-e0ea-4bdb-b7c9-bd9afb30d896" }, { "type": "text", "object_relation": "detection-ratio", "value": "60/72", "category": "Payload delivery", "uuid": "1d3a2c8c-c1e2-4bd2-91b6-759bf269d545" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--0160b000-c718-4bc9-adc4-40fdaadbfe06", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = '9ff18f7a19e06b602e19b9e0aca3ad84' AND file:hashes.SHA1 = 'bcbb5bbc55b4f44397c34e9fca2017587e69219b' AND file:hashes.SHA256 = '9d8cbb2bf4801276de2143ccd64a7d0f66263809a90bea0b664282a15d121d9e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--cf6f7ae6-d0d1-4846-bd3f-eada735297bb", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-29T15:22:04+00:00", "category": "Other", "uuid": "32508ebb-7e71-40db-850e-1f867fe9a3f2" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/9d8cbb2bf4801276de2143ccd64a7d0f66263809a90bea0b664282a15d121d9e/detection/f-9d8cbb2bf4801276de2143ccd64a7d0f66263809a90bea0b664282a15d121d9e-1603984924", "category": "Payload delivery", "uuid": "fb0e10e5-4052-4788-af23-6cbcc686848e" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/67", "category": "Payload delivery", "uuid": "e38761fa-8696-4b65-84af-3da55c0fe953" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2f72d335-4d2e-446b-b91c-9f3ec0c5825f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = '9843710a665219484ba6b93b0f3aff5d' AND file:hashes.SHA1 = '66c9c98978bac095f5f69ac84e06b7ea7d509120' AND file:hashes.SHA256 = '625bd1db4f5fbd8fa9a4c78bc7f1ffe421dead5b0b0b4b2a65be879f9a123a23']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--671d9a9c-557b-4954-afb7-84116dfaafdf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T05:13:47+00:00", "category": "Other", "uuid": "3883a4ea-d381-4e47-bdb0-7387bbc5e6c3" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/625bd1db4f5fbd8fa9a4c78bc7f1ffe421dead5b0b0b4b2a65be879f9a123a23/detection/f-625bd1db4f5fbd8fa9a4c78bc7f1ffe421dead5b0b0b4b2a65be879f9a123a23-1604034827", "category": "Payload delivery", "uuid": "09698b6c-8eb6-4339-8826-f2eb5e20e8bc" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "cb2d5465-817c-4342-9d5f-27d43f79e934" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--a5d51c54-9186-434c-9370-1b043a73527e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = 'a661aeb906f044b100f557a47f6003a1' AND file:hashes.SHA1 = '607f6034eae83b6546060cff5085d79b0bb0a7cd' AND file:hashes.SHA256 = 'ba2a96dae66324df5bbb0751a04c538722ad49daa12d51625f8a1890608b1168']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b1c3a402-f547-4396-982a-95a61fc14c24", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-17T00:22:53+00:00", "category": "Other", "uuid": "9799978b-2ba6-4e31-9df6-3c5d357cd890" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/ba2a96dae66324df5bbb0751a04c538722ad49daa12d51625f8a1890608b1168/detection/f-ba2a96dae66324df5bbb0751a04c538722ad49daa12d51625f8a1890608b1168-1602894173", "category": "Payload delivery", "uuid": "69f27191-8030-4661-a91d-4140505922ea" }, { "type": "text", "object_relation": "detection-ratio", "value": "49/70", "category": "Payload delivery", "uuid": "2123b422-059d-474a-8436-2f25f90a01a4" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--39ae68e0-13ea-4711-b214-3af059803286", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = 'b3538b8fe99d1912479e0312f184f996' AND file:hashes.SHA1 = '39fd9e92abcb2375c834a388ad68c540e31bbaf2' AND file:hashes.SHA256 = '9f74293d070390a2f783030eed5de4c64b1d32e2046b8c440cc39984b453b12f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--36c61803-2877-405f-b6b0-5acbe905782e", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:00+00:00", "category": "Other", "uuid": "3fdfbb7f-dd4e-4731-9fa8-82148cfa1054" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/9f74293d070390a2f783030eed5de4c64b1d32e2046b8c440cc39984b453b12f/detection/f-9f74293d070390a2f783030eed5de4c64b1d32e2046b8c440cc39984b453b12f-1604018880", "category": "Payload delivery", "uuid": "35d8797c-e3d3-450f-8fc9-e158514a3fc5" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "c2cb51e3-0921-411b-ad15-58dc86ee7d7d" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--2a42886a-67dc-44e5-bdec-bca5c3b4aaf3", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = '274cc6ab4f50a45f91bd491efbd9c7ba' AND file:hashes.SHA1 = '16d66c07666dc9900ff46cdb3738f4df48368cb3' AND file:hashes.SHA256 = 'd9dc572d6e446ec7629479eb60119b57a135e77aae22ea9f5a29a543af85b7da']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--09d1177b-e3e6-4f3d-925b-ac25620cad00", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-05-07T15:18:07+00:00", "category": "Other", "uuid": "a7d77b68-1945-4cd3-8082-eec0234042c6" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/d9dc572d6e446ec7629479eb60119b57a135e77aae22ea9f5a29a543af85b7da/detection/f-d9dc572d6e446ec7629479eb60119b57a135e77aae22ea9f5a29a543af85b7da-1588864687", "category": "Payload delivery", "uuid": "f762a1bc-bd9d-4c66-9257-5ccc15d86f3d" }, { "type": "text", "object_relation": "detection-ratio", "value": "0/59", "category": "Payload delivery", "uuid": "4559dbdb-43c7-425b-b9fd-3344f1966af9" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--be44f41e-6b44-4cc5-9f3d-8bf5755c4e91", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = 'f2d75e2de4845c1478497c28cbc42251' AND file:hashes.SHA1 = 'f4a806dc83bddf79d1973c421997668a9e125cfc' AND file:hashes.SHA256 = '5c3569c166654eed781b9a2a563adec8e2047078fdcbafcdef712fabf2dd3f57']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--90c6a983-0097-405d-816a-d7d0aa604363", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-08-26T20:02:37+00:00", "category": "Other", "uuid": "ffc60bae-969c-465b-afd3-6b2f7a4bc7a6" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/5c3569c166654eed781b9a2a563adec8e2047078fdcbafcdef712fabf2dd3f57/detection/f-5c3569c166654eed781b9a2a563adec8e2047078fdcbafcdef712fabf2dd3f57-1598472157", "category": "Payload delivery", "uuid": "2da6cd1d-a596-4464-9855-c7be999a0e96" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/68", "category": "Payload delivery", "uuid": "510a5537-0ed6-4f67-8413-51737ebed69e" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--c2b35c06-e9fb-4bc9-be25-fc70417cedf4", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = 'f8aae4c883e19e3e1e880e7ae38c2369' AND file:hashes.SHA1 = 'f3ca59da7702ca9cb8fdb9f1b764ef2c7915a8a5' AND file:hashes.SHA256 = '8b6c3018958e7ae20989045811358b1225606000c879000c779444cc50290d9e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8a87830e-ecc9-495e-84ba-a143f2bcd94f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:44:36+00:00", "category": "Other", "uuid": "b39033ca-a37c-41bf-a06b-f1d307e6419b" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/8b6c3018958e7ae20989045811358b1225606000c879000c779444cc50290d9e/detection/f-8b6c3018958e7ae20989045811358b1225606000c879000c779444cc50290d9e-1604018676", "category": "Payload delivery", "uuid": "d6bab64e-816d-4cc0-833c-9afcfab48587" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "2a749950-8809-4ce2-b906-07c453156a80" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--4e1bef3c-5152-40f7-b83f-b29b1737af98", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:28.000Z", "modified": "2020-10-30T08:56:28.000Z", "pattern": "[file:hashes.MD5 = '940cc2c6dcd0bdc0875abbc7a309a345' AND file:hashes.SHA1 = '83d78d12cf7f8bb291c7a65ece1a0bc92d11d03d' AND file:hashes.SHA256 = '98266835a238797f34d1a252e6af0f029c7823af757df10609f534c4f987e70f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:28Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--6a445163-58d2-473d-9100-c9b17e1d420b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-09-18T21:42:06+00:00", "category": "Other", "uuid": "433fc300-54dc-4fcd-ba73-96b5c730d76a" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/98266835a238797f34d1a252e6af0f029c7823af757df10609f534c4f987e70f/detection/f-98266835a238797f34d1a252e6af0f029c7823af757df10609f534c4f987e70f-1600465326", "category": "Payload delivery", "uuid": "79f307a4-cf36-434a-9696-a45a70e2837c" }, { "type": "text", "object_relation": "detection-ratio", "value": "48/66", "category": "Payload delivery", "uuid": "df18e53a-9f89-4b53-b67f-237b8bdc32bc" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--059a2690-75da-4ce5-aa90-f93ab97f530f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "pattern": "[file:hashes.MD5 = '26337d35353d2df5d778a4ed6075cb70' AND file:hashes.SHA1 = '996bfa802dc83374fe9b018f39a004aae76e51fb' AND file:hashes.SHA256 = '5eddf95ec34e512d6db1058fdd9fa886e3fc1e7d4090d1999f1764627db5c1ee']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--fbaaca08-1b6c-44c6-9aec-171935d04e5c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-29T09:44:32+00:00", "category": "Other", "uuid": "53c7a1b3-6d46-48dc-8459-7730db9958bc" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/5eddf95ec34e512d6db1058fdd9fa886e3fc1e7d4090d1999f1764627db5c1ee/detection/f-5eddf95ec34e512d6db1058fdd9fa886e3fc1e7d4090d1999f1764627db5c1ee-1603964672", "category": "Payload delivery", "uuid": "408461a3-6fb8-4e40-96ca-48a9415f1a7c" }, { "type": "text", "object_relation": "detection-ratio", "value": "52/71", "category": "Payload delivery", "uuid": "daafdcb0-8f46-47df-9774-254638c648dc" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1e10c051-b1b1-44b5-9c28-8dd9e3752a6c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "pattern": "[file:hashes.MD5 = '89c640bec51ab9f8d97add9a0dd39512' AND file:hashes.SHA1 = '607b6ac839547dc71058044d033528e34e6e004d' AND file:hashes.SHA256 = '0e464ad7bde50e55aa42dac985295e22deb78c1a48809563f18cd4a6f47a104a']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--8dfb30ca-fe11-45b7-96df-67e092866720", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:00+00:00", "category": "Other", "uuid": "a9394aa7-bc9b-4ea1-aab9-34a1d8743d5d" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/0e464ad7bde50e55aa42dac985295e22deb78c1a48809563f18cd4a6f47a104a/detection/f-0e464ad7bde50e55aa42dac985295e22deb78c1a48809563f18cd4a6f47a104a-1604018520", "category": "Payload delivery", "uuid": "5b461b90-473e-48e5-b9b7-3f0e929821a3" }, { "type": "text", "object_relation": "detection-ratio", "value": "58/71", "category": "Payload delivery", "uuid": "3ae3a26e-86dc-4f38-a48f-2697f488bff4" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--1253fc5b-4990-4d6b-957f-c0df3912a373", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "pattern": "[file:hashes.MD5 = '0bacda01ec71e1df695121f1c614f67b' AND file:hashes.SHA1 = 'b31ba210bfdbad030832f7770f55090fb4e727c3' AND file:hashes.SHA256 = 'c498a138ca1fb1ae1c834cbe5f76eda226b0fa7b29bc6cbd8b92478e394b287f']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--e186fa28-a483-46dc-841d-47cf32443adf", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:48:53+00:00", "category": "Other", "uuid": "ada0a960-ca62-4646-bbfd-48885f92acbf" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/c498a138ca1fb1ae1c834cbe5f76eda226b0fa7b29bc6cbd8b92478e394b287f/detection/f-c498a138ca1fb1ae1c834cbe5f76eda226b0fa7b29bc6cbd8b92478e394b287f-1604018933", "category": "Payload delivery", "uuid": "b8b5215b-d7dd-41c9-8c9d-540abc742be4" }, { "type": "text", "object_relation": "detection-ratio", "value": "61/72", "category": "Payload delivery", "uuid": "be3cde49-3c9d-4522-96a8-8fc26be14de0" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--80f3ef4a-a9a5-4329-9597-21fb85287468", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "pattern": "[file:hashes.MD5 = '253ae06106861c81af9cf9b94f8e3119' AND file:hashes.SHA1 = '935374a7e94dcf3811d2e27c46dc451688e6e71c' AND file:hashes.SHA256 = '841680207f8c57f4e183610f022f01642d86c5a2fd0323463039b751e5559dc4']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--d6ecedb2-858f-4080-8238-1e674aaa6d83", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:40:02+00:00", "category": "Other", "uuid": "04f9b9de-0bf1-46dd-8b77-c23c2effcab9" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/841680207f8c57f4e183610f022f01642d86c5a2fd0323463039b751e5559dc4/detection/f-841680207f8c57f4e183610f022f01642d86c5a2fd0323463039b751e5559dc4-1604018402", "category": "Payload delivery", "uuid": "15550c70-82e2-457f-af29-8ea498b1d480" }, { "type": "text", "object_relation": "detection-ratio", "value": "41/72", "category": "Payload delivery", "uuid": "70d8911e-13f1-451b-b7fc-850a3c10fb48" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--9bfa8642-f8fe-4e9e-a37f-5d43e5aeaf03", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "pattern": "[file:hashes.MD5 = 'fb03bd4432d38fe633327532d151e76b' AND file:hashes.SHA1 = 'ebcd5403d15c3289621c318751eb80069c8baa38' AND file:hashes.SHA256 = '7753fd8c401e0efd8e5d0db07ea7b60eb45d034b7685b656d708f3885d8e7906']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--9e583e66-b14c-47cb-815e-a0b0d1e85b4a", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-11T04:34:18+00:00", "category": "Other", "uuid": "d479b74e-2584-48bd-9b4c-2319fe10e098" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/7753fd8c401e0efd8e5d0db07ea7b60eb45d034b7685b656d708f3885d8e7906/detection/f-7753fd8c401e0efd8e5d0db07ea7b60eb45d034b7685b656d708f3885d8e7906-1602390858", "category": "Payload delivery", "uuid": "85fc02fd-1640-43e6-bec5-c0a97b2c1af9" }, { "type": "text", "object_relation": "detection-ratio", "value": "56/69", "category": "Payload delivery", "uuid": "7cc9fb79-2ca4-4674-aa0f-de1ce8f71b37" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--ee861cc7-1104-4b21-8c06-d0f92bef929c", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "pattern": "[file:hashes.MD5 = '3a500781f60fc0cd6ac12a51b1fad722' AND file:hashes.SHA1 = '73051cb1c60ea18ce23e1d0ea92703faf3734cc9' AND file:hashes.SHA256 = 'f6f3d1d060274e114c80bcd35c3f5e97909cf6ffd793bdab27d1eb913a0d391e']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--35cc2bf0-ecbe-4b5e-9db6-912ebeefb488", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-14T00:53:16+00:00", "category": "Other", "uuid": "459f8814-f7d8-4079-9391-22db64a08009" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/f6f3d1d060274e114c80bcd35c3f5e97909cf6ffd793bdab27d1eb913a0d391e/detection/f-f6f3d1d060274e114c80bcd35c3f5e97909cf6ffd793bdab27d1eb913a0d391e-1602636796", "category": "Payload delivery", "uuid": "f37a6169-d754-4198-a6dc-b5645ca4f36e" }, { "type": "text", "object_relation": "detection-ratio", "value": "1/59", "category": "Payload delivery", "uuid": "94c442eb-e575-4ade-83cb-54861f524357" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3645e877-e229-407e-9b05-f50f5bc924de", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "pattern": "[file:hashes.MD5 = 'a6d36eca69afde7c05d3d71a8612f2b9' AND file:hashes.SHA1 = '4dad5f8b4fce542b1038195c33e2980a9810ea69' AND file:hashes.SHA256 = 'f20c78fb33d42d874ed6fdf7096a4dad9b3637e05ccc8ae52ee6cc4e5dd8a0bf']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--b73a48db-798e-497b-9654-9467f848615f", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-06-11T10:18:29+00:00", "category": "Other", "uuid": "7011db15-dc4f-4712-8ab5-2631d98a7034" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/f20c78fb33d42d874ed6fdf7096a4dad9b3637e05ccc8ae52ee6cc4e5dd8a0bf/detection/f-f20c78fb33d42d874ed6fdf7096a4dad9b3637e05ccc8ae52ee6cc4e5dd8a0bf-1591870709", "category": "Payload delivery", "uuid": "a8f5da4a-e3e5-42f4-bac7-43a590055c1a" }, { "type": "text", "object_relation": "detection-ratio", "value": "31/61", "category": "Payload delivery", "uuid": "321c7fbe-2c72-4ac0-80fc-0ab868c50a53" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--8d9e3f84-afe5-459f-a511-733d0a6c73a1", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "pattern": "[file:hashes.MD5 = '5da1ec0c2839285fd6e098e3ffd5874b' AND file:hashes.SHA1 = '25cbf4ddc74289a68db98b040386f10e226455fc' AND file:hashes.SHA256 = '95d4c0e642a3b2c9fab0a2d90b2d127ed12d9ae1e8e721806e9eefc75d77ee3c']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--f7bf32fc-5b23-410b-8f1d-0e5408c44680", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:47:43+00:00", "category": "Other", "uuid": "bf5842dd-242a-4289-8cc2-599298c32209" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/95d4c0e642a3b2c9fab0a2d90b2d127ed12d9ae1e8e721806e9eefc75d77ee3c/detection/f-95d4c0e642a3b2c9fab0a2d90b2d127ed12d9ae1e8e721806e9eefc75d77ee3c-1604018863", "category": "Payload delivery", "uuid": "77bd6233-0546-44f3-b435-204354765bd9" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/71", "category": "Payload delivery", "uuid": "579564e3-99d4-4823-b1aa-c8cf3b9c7f87" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "indicator", "spec_version": "2.1", "id": "indicator--3fb984a2-e658-4433-a266-93ade5cca32b", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "pattern": "[file:hashes.MD5 = '9078b42779cf2c9db2d05b233f030405' AND file:hashes.SHA1 = '4bcdd4b2d39284feca4ee9486efe9694729858d1' AND file:hashes.SHA256 = '118611de57551faa4b7c029e50317cd6f596275725f61a9f9a11fb59e1ad70df']", "pattern_type": "stix", "pattern_version": "2.1", "valid_from": "2020-10-30T08:56:29Z", "kill_chain_phases": [ { "kill_chain_name": "misp-category", "phase_name": "file" } ], "labels": [ "misp:name=\"file\"", "misp:meta-category=\"file\"", "misp:to_ids=\"True\"" ] }, { "type": "x-misp-object", "spec_version": "2.1", "id": "x-misp-object--c7153b15-1d40-4e08-908c-7c2a0d374c12", "created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f", "created": "2020-10-30T08:56:29.000Z", "modified": "2020-10-30T08:56:29.000Z", "labels": [ "misp:name=\"virustotal-report\"", "misp:meta-category=\"misc\"" ], "x_misp_attributes": [ { "type": "datetime", "object_relation": "last-submission", "value": "2020-10-30T00:42:05+00:00", "category": "Other", "uuid": "bda8b7e4-c53b-41de-85ce-e2e94c158d05" }, { "type": "link", "object_relation": "permalink", "value": "https://www.virustotal.com/gui/file/118611de57551faa4b7c029e50317cd6f596275725f61a9f9a11fb59e1ad70df/detection/f-118611de57551faa4b7c029e50317cd6f596275725f61a9f9a11fb59e1ad70df-1604018525", "category": "Payload delivery", "uuid": "a1fd8a66-bf21-42bd-baa5-4377341c7f9e" }, { "type": "text", "object_relation": "detection-ratio", "value": "59/72", "category": "Payload delivery", "uuid": "d1641baa-1881-4657-9c21-b20ca384ff47" } ], "x_misp_meta_category": "misc", "x_misp_name": "virustotal-report" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2004b9da-f321-40d2-a109-8fcdb46ffded", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5e4b3ebd-ca0a-464f-ad10-70aea4b7ae7d", "target_ref": "x-misp-object--00e2ce66-809e-426b-a464-03a3c73515af" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c68fdf70-90e7-4c7c-90d7-9f9f6f82ae00", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ac882397-2143-439d-a35c-29d75328afc1", "target_ref": "x-misp-object--2fd08d36-d4b0-46d2-b04b-e73b5d0dab09" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9f88c670-3c05-44c3-8774-88f9b2d54c93", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6fd4b80d-ab64-4af1-a3a8-ad9b6d395c75", "target_ref": "x-misp-object--9b52878f-f520-4816-a7e5-7d612600a435" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--de5c56ab-9c0d-473f-a755-e2dd6904e47e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b6522bbe-f37c-489b-8e4c-c2876a8dbbe4", "target_ref": "x-misp-object--529bb072-ec45-4bc8-9cbe-327e2a8c87fb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5b689858-9acd-43f0-a1b5-cda2c32f2222", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3f2c3c0f-8e53-4526-97e6-2f13c526f330", "target_ref": "x-misp-object--576829d7-5640-4605-910e-d1d6874e0686" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fd9c1714-eb6e-4827-8205-961f2773ae6a", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--908358ba-5ed0-4297-b786-12a4289242f8", "target_ref": "x-misp-object--b43ea474-a729-4dfd-9e40-0822f358eb91" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--bb7708ca-3a71-43c0-9b5a-dd6a1f3d50c9", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ead61ca6-0171-45e8-866e-d771f0dff221", "target_ref": "x-misp-object--75db51bf-03f3-48b7-b91e-a61105c01f5e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--388b4ebf-9913-4e78-b17a-4650e78128d2", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d29baa9f-3cb5-417d-8a99-0036be91261f", "target_ref": "x-misp-object--72cae686-0ad4-42f7-938e-640b8cf6c173" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6cc1f515-dc50-43da-8d3e-25e4f7c69c81", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b1f6ca3d-e038-406a-84a1-16f010a477fb", "target_ref": "x-misp-object--7449d241-4e95-4a07-b3d4-e5aaf770bf80" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9b2559e3-d579-4030-b4ee-84e594a33514", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--63c96554-bdeb-460e-a6fc-f34d987c6f9a", "target_ref": "x-misp-object--fc3eeb39-1a76-4f90-b349-5b18765ffbc6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--59c8ecc0-abf1-4cda-9356-1973d66b0ac2", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7cc421fe-a7f7-4ce1-8350-e097b2d323a4", "target_ref": "x-misp-object--8007aa8a-ca37-4ade-927f-5a18d2494e6c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7d20cf60-2708-4aa5-ae1b-6e0126aa5a81", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--88bb68aa-24a7-43b4-aa66-2664b2d7a6fe", "target_ref": "x-misp-object--4deb19ef-d3a2-469c-8867-ec0068cdecd0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6a242ebf-feea-4f7a-aa68-845ef148fb72", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--87954ab5-4409-4ea3-94f8-165babf4c710", "target_ref": "x-misp-object--088808e2-c340-49e6-96a5-9b0bc41b85c4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--57b1a702-fc0b-4ab2-9806-7c3d5487913e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2a2dd0a7-5011-4981-9b67-f02c12b8f45e", "target_ref": "x-misp-object--31caa127-b831-4dba-a175-597008420dfd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--727c1221-23fe-4238-9943-d3edf74875f4", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8bb6b5f9-1eec-437c-b4e4-9f383f4cda2c", "target_ref": "x-misp-object--c14b090b-a2e7-4aa9-88dc-22ce1ec164f5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3bfd66e0-398e-4c28-a1b9-e9ef6f869b9a", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ad88c285-5054-45f9-ace8-cdcfa5353a47", "target_ref": "x-misp-object--a5bb37a9-4148-4e6d-af0a-9f0236e9081c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1ffe64a7-69da-4f94-bb6f-1ab40824150e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c2cc0844-2ef9-4a4f-8073-8d562ec641b4", "target_ref": "x-misp-object--2e469fab-9d51-49a5-8853-f1d932426d8e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--939fab23-5ac4-4117-942e-fdd1f2c08888", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c0afae13-062d-49a7-a713-9a51b448b3a9", "target_ref": "x-misp-object--d578e159-ed9c-4d51-b571-5222bd7c89b9" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ef9b5cd6-1021-4e1f-8374-e3f890e94c76", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d024baa3-1fec-4c1a-8553-0e6f98f25421", "target_ref": "x-misp-object--313aaa43-c6cf-4b04-bbd2-2445367ac02c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d399aa71-e332-4ef1-9c1a-688f2c744dc8", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--26310581-f95c-4206-abc1-7bf5c0a488ac", "target_ref": "x-misp-object--798d4c42-9a74-4124-9c97-4d480a05aec4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8080b456-f760-4a71-8c4a-247ed219fa47", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e8b4a663-ff85-43cb-8398-8f1fbbc197cf", "target_ref": "x-misp-object--55b4925d-4e59-40cf-918c-5cdf333dacfb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--891c1299-3845-4fb0-ade2-432c6165a196", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ac1d0ce6-08f6-4b69-8614-6ab3044ecc44", "target_ref": "x-misp-object--7ceb59f0-3fa1-43ec-aeb8-16a783f01fe3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--22c2fe4f-d81e-464e-96aa-edd9f19f493f", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e1ca9c54-2ce8-44bb-bfca-350de81502ba", "target_ref": "x-misp-object--aa951bc9-ef07-4251-aa0f-4538eee478de" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--dc9069f7-844f-498e-bddc-a41605ff45a6", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--6fc8fff8-49cf-4081-a039-736633c0ed58", "target_ref": "x-misp-object--383142fa-6e3a-4f81-9235-567eeb5b0ab6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a4695d0b-41a0-4f1d-88d4-726abc424275", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3481a175-cb01-4840-9abe-cbd87234807a", "target_ref": "x-misp-object--8e613b40-bd32-45a9-93f9-f3339ef5265a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--210a692c-0082-4063-ac5f-c67bc0cbb534", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ee57c4f1-12e8-4d02-9d9b-7aff080fb603", "target_ref": "x-misp-object--09432c45-43fc-42cd-be4f-dadab4fedd84" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--332e1de5-7195-41f6-8ade-b9687142780e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b78c654a-eb99-40d0-8b4f-598364a838d0", "target_ref": "x-misp-object--b9366adb-2b69-4fa3-9d43-aa29ebe4b2cd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--df350e1a-c994-43c4-ac8d-8f561e00cdaf", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2a3fb881-8056-4765-aa9a-27a80acc6bf2", "target_ref": "x-misp-object--4bd2979b-dbc0-40c3-9479-14121d9d47c7" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8f145969-265e-4628-b4db-229e226e906c", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--aef19916-9097-40ef-a7d3-243415f3d0d8", "target_ref": "x-misp-object--2b85fa93-dc70-4992-81eb-df1175ee277e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--dc1c6f11-3f78-45b0-b108-98a5f4ed97c2", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--cd330673-923f-4a4b-8ceb-46b108f3e454", "target_ref": "x-misp-object--e2c9a6cc-d8c4-4f67-8c61-5d407dcbba9a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--17de730d-e71c-436e-b518-c7287e4f9368", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0de8f154-20b4-4cbb-bff4-8387a4018315", "target_ref": "x-misp-object--176ed5ae-6f90-4672-9199-96121aaf2700" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e1f99690-b895-4d7a-8565-bf0222c21014", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7648e2bb-97f3-4136-8638-19438312c1f0", "target_ref": "x-misp-object--bb073d81-1582-4442-96c3-3154f7c5175a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4947df0f-5b9a-4df6-8ab8-1ea73bdc5a04", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f3f44c88-aac0-4659-ba55-ec85914a6a43", "target_ref": "x-misp-object--223881fc-7e22-4e6e-8e2e-5ef678fe01fa" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c4cc7cbd-e353-4b7d-9f8d-2fc389b2a5a1", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d96379c5-a04f-450d-a1fa-5130b7a9cb47", "target_ref": "x-misp-object--1a591c5c-22e2-4927-b929-cd9648cce64f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--69a6d81d-c23c-464a-9aad-c35abf4b0335", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a18de543-51a8-473e-bce8-8bd40a06da42", "target_ref": "x-misp-object--41054227-3150-48aa-9ff9-e4107aead60e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d7f73703-b1c0-4b54-a742-c92cc763605e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--57592eb5-8a8b-469e-bf60-91c626a922a2", "target_ref": "x-misp-object--71ba1cdd-c76a-4bad-98db-d57286d9b019" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6766135b-7c2e-4d7d-a11d-bc74fc62bdfc", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--efafad91-2966-44fa-8c60-ddae7045e5d7", "target_ref": "x-misp-object--7bd9928c-6e1b-442f-a824-4e2734b88c6b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9690043d-3c57-4d25-9dd4-6e9074afaeb5", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b5ad9db6-0a4e-469b-8ac0-253343f5ad6c", "target_ref": "x-misp-object--bf16277d-9e5c-4ccb-9be4-d9cfbb73d9dc" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--acdb001b-fdcb-4281-9f32-ca0202471644", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3aa019cf-6f11-4c11-8dc3-8fc6362cc78f", "target_ref": "x-misp-object--6ee0e6f3-3dc6-4bad-9153-ed89aa3bd203" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6dbe4cd6-3aed-4704-82d5-e86fb52c35af", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2e764a7c-ecba-4130-9a68-3133b53bf5df", "target_ref": "x-misp-object--e3bd6581-d6d2-4b6f-a9a9-e1b31abb699e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fbdb2842-79b8-4d9a-9af7-732addccd91f", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d7dfa178-99ac-4825-a28b-5cb6880e06cd", "target_ref": "x-misp-object--e4dcecdb-c624-4a3c-8204-66150147aa90" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9684a4ae-07b2-436e-929b-a00c4318c31a", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b6b91a9e-68d7-4ba3-8166-f504e3be3b6b", "target_ref": "x-misp-object--21e7e39a-bd74-415d-8e88-f25186436c50" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0e61d853-eeae-4c08-97be-b18bc6972396", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e87a965f-c0f1-4f03-897a-b5361fb2d880", "target_ref": "x-misp-object--025f1bca-c27e-471f-85ef-03184b237b0a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3a0dfa34-6632-4589-8971-922b5b8d8b3c", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--918be153-49bb-4879-b579-a382954e498c", "target_ref": "x-misp-object--a29d49c3-f6e7-4100-b436-0c41692ab3a2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--13bb81b3-25d2-435a-a3b4-8f0a39771324", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f7385be0-aa1d-4ef4-9157-6daec20898c1", "target_ref": "x-misp-object--ff796147-94b9-4bb1-92e8-2a6fd814e7da" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--aaf50cd2-fa9a-465e-a500-88bfb500635e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--62c0a296-7be7-4cf1-984a-4b46b085caa4", "target_ref": "x-misp-object--a9f7b81f-7604-443e-b586-0d3cf4805b56" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e2e52adb-5a13-4a82-8663-c99776130f3c", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2dbadbc3-f1de-4ffb-92ad-bf50f91c6a19", "target_ref": "x-misp-object--bf998784-79f9-4511-a2b2-498c898e185a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e1cb436d-98dc-47a5-b0ef-ab9dff7c39b8", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d331b125-a13e-4057-b5ce-bf053af711cf", "target_ref": "x-misp-object--de27aef4-ed60-404f-9ba4-597005687128" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--dcffcf70-7432-44d5-921e-6f4622a9f953", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f2784493-71c7-4b60-ad28-ad9a09f8cdc0", "target_ref": "x-misp-object--00ea0bff-a83d-406f-8b8f-a77c7be4c548" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e23efae6-c17a-4204-a2df-e4097446107b", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bd853739-de6d-4768-8a0a-ce7724eec488", "target_ref": "x-misp-object--2730a41a-4db9-4941-b48d-74b906548f6c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--56d93650-4ea5-4966-8858-3eb100a10049", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e910ee1e-2815-4633-b427-104b225074f5", "target_ref": "x-misp-object--e068d586-bfea-47d5-93c3-350f8e62500d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--98c1b2bd-89ac-4696-a880-ecb325fcd75b", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--815fd311-7b72-48a8-b229-17fd3b51ee79", "target_ref": "x-misp-object--8c70d678-a6ce-40f3-91f0-6f607cf17d29" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3e521a1e-7bf0-4710-9c8f-b75ba1ada6f0", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0405a5d7-db95-4327-95c0-b6a0a20542cf", "target_ref": "x-misp-object--484616fd-564a-41cc-ab11-b27601894e64" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7fdbe12b-7fbb-4b63-8187-54a187678222", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3789b1a0-f5cd-4797-ac5e-3d0818ba37b7", "target_ref": "x-misp-object--5579c4b5-b230-43d8-9886-a6121ec0cb5b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8f7ea324-2c77-468d-9fe2-10f314299c9d", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--fc290971-f01f-4a27-b43c-07cd460da553", "target_ref": "x-misp-object--a32edaaa-09b9-4070-9659-6f65980fa8c7" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--18a04751-3ad2-4052-9ec4-bf637afa4dbe", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a3b413be-28f2-4493-a5ea-7ce2ddf052cf", "target_ref": "x-misp-object--d355ca07-12b1-4d4b-ae89-aedc781725c1" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--11d6fe3f-bb3c-44c7-9036-82c41508ea48", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--df33d0fa-6d8d-438b-b826-144b187ece1c", "target_ref": "x-misp-object--74b71387-2317-4822-b0f2-01ad97f9047e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6668a4f7-c58a-4659-a282-6239e6af05eb", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9af3492c-af01-4736-86e1-3430a33b492a", "target_ref": "x-misp-object--3177bc73-b1ec-43db-bdde-4042d60c51cd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f5a2b793-facd-4e53-b763-4525b03401b3", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--eaac6baa-ed1f-4dbf-b0d6-438bf4ce64b5", "target_ref": "x-misp-object--86b6ea9e-9699-4e6e-b2e4-5d289359ccc7" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--17133908-6fbc-4d4e-9190-a881dbd1a00d", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--f3344dbd-f6a7-484d-a4d9-75fb5e9b9acf", "target_ref": "x-misp-object--f00111c5-411a-4b56-8240-726b65b12afb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8ab00402-8dbb-46b9-a5cb-be7c566771b6", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--29e91ca5-7461-4a16-b343-c0fb04e0ce3c", "target_ref": "x-misp-object--58c39a24-6350-4af2-ab12-ad1a4af2e1db" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--da60edb1-8b4f-445a-b804-441fa40bb62d", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--12b3a3a2-6f5a-4654-b899-6a56b204da23", "target_ref": "x-misp-object--09e6d590-7b5e-405c-b4fc-55538d5ed355" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4127ad47-ce95-455a-beb6-05076300badf", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--959930b1-e452-4086-8de7-f4eb2211867a", "target_ref": "x-misp-object--075a0a66-ea46-4d51-93a6-8b806b4e06e4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--99e2ba66-2370-4556-aa47-53d17ebea5a3", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--48526a88-0d80-4ddd-b72c-eff9063d9336", "target_ref": "x-misp-object--9ce1ccb1-8ae7-4ac8-abb6-3d1526ae1fdb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--85789293-071e-42d0-97e4-8b42bd934d83", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4b8826a4-1cb6-4ce6-b5a7-2ea20fafcfb4", "target_ref": "x-misp-object--d3c98553-110e-4c61-a5e7-048641e3c170" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b2a4e16e-81a4-4d05-b422-36423517b3fb", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--34884b9e-28f3-4729-8ca3-8875cae378cb", "target_ref": "x-misp-object--a309d336-b26a-445f-93f0-fce29cdc5fb3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ddf82dcc-0093-4ad6-8400-77cfff43ee4b", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b61b3d4a-28e6-44ef-b1b2-a2b36a4eae64", "target_ref": "x-misp-object--0e1f1a26-a52d-4079-96b3-0db6699c2ac5" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--dfee9f4a-6b15-4e2e-9ab9-4bf6c14e899e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1c0f1467-b600-477e-b547-2f3fab94e40c", "target_ref": "x-misp-object--493ee987-5bd4-4447-a109-50c6fdeeae8c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ee33918a-3c6c-4a91-a9d4-3ca3ee3ff0bf", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8ebf900e-115e-4b27-b918-a07645b68a14", "target_ref": "x-misp-object--fb7fb320-1174-403e-b929-eb9db6eed7b3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c510d23c-4780-4288-8320-b9d5179269b0", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2a4282df-4e58-4422-bee3-ed2865b6b284", "target_ref": "x-misp-object--7c97fc9c-4c09-4493-adf7-12e22ac2594a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b952815c-2b38-48d6-bb9c-0df1d8bf2f61", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7d7d4a70-ee4c-43b8-aa5d-42b62e4aa777", "target_ref": "x-misp-object--2e02e67e-0651-4277-94da-242d2e623fa6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5e8f0b1a-ced5-48c1-8331-091da791ce75", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c57ba634-6efb-408a-8c09-2a0e293ca19f", "target_ref": "x-misp-object--3df16408-ad08-4c07-b8ed-013fb5e5776a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--5c2f6b46-1a35-4d4e-9292-e6c72eb61300", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--38d1cb99-e855-4370-a0a8-e182a278c949", "target_ref": "x-misp-object--3f5d58f8-14e3-4c42-a101-615cd46b331e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4e8ccd92-c525-4557-a4b9-b2b8b18654a5", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--255c13ee-0a73-4ee2-8a83-faa9dd470949", "target_ref": "x-misp-object--55e00e7a-0bd7-454a-a2ea-89b3f6657ffc" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9aff9112-1a98-41c9-a8dc-6a1b4c6b55e2", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1e2f2b4a-6d4c-4a60-84ff-7ea3d7593836", "target_ref": "x-misp-object--7ab00ac0-8a31-4970-a44a-af22ef8267dc" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--4aef56bb-32e0-41cf-9810-f8e434ff535f", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9dab14e9-110e-4e3c-b6ef-077e8b271b1c", "target_ref": "x-misp-object--a0ef52a5-9179-4e7d-8599-c91ce3cbc3ed" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--eee1eebb-29c2-4b17-b536-7670b96b7eae", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--de2c6a1f-b0fd-4c3a-8046-6e259ecd7e33", "target_ref": "x-misp-object--5a11630a-39c6-4a6e-aacf-d681532964d8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ec00ed6c-b650-468c-b481-6dddedc62af3", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c27ef6ef-3a71-4749-8719-49947bb36071", "target_ref": "x-misp-object--f9421198-639e-495d-97f0-7db5082ce37d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9f10e7ee-7226-40c8-ad68-54c30ff28d22", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ba8d598d-5a7d-410c-9c54-b214aa1962f9", "target_ref": "x-misp-object--b2f94bd9-50fd-45f2-acc4-46affe62f4f0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--35ab81e6-7b45-4f64-9674-6a03b9dfe1f6", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b3350403-f5e2-45ef-b079-da4b4a602c6a", "target_ref": "x-misp-object--a1b404d6-436d-4d0a-b71d-6513a816eae6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--eea092a6-b825-4449-9e92-20b8f9501898", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bd1a17c8-d750-4cb6-9d25-2be9e7d6768e", "target_ref": "x-misp-object--ff1e3b2c-f241-4015-ad25-70421a2bc582" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--48c70f52-755c-4f85-8a93-47c0bb8da0cd", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0a8550e5-8efd-4a4f-b363-3dca1c72adf9", "target_ref": "x-misp-object--035e778c-2641-4fce-8b5f-2125d049695e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e748b602-a82d-4660-bf38-ccd2c5d7d34d", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c25b971a-bcba-4e8c-bfaf-0b5e6d94b9fb", "target_ref": "x-misp-object--d20df19b-04e9-40d8-a031-3e91fa73ce1d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ede10be1-95e8-4958-b3b1-acba2a1fdf4d", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ec94d76e-bd10-4c4e-80e7-1dca0cfdbf6c", "target_ref": "x-misp-object--bb2c2496-37da-47ac-b78b-c312d9b49cff" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--30b3018a-75ce-4ecc-9cac-b4364c9bd539", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bd495716-d98e-47e4-9809-d662914add7a", "target_ref": "x-misp-object--a4e3943d-0dde-454f-a5da-bfb3cfff5774" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--98190a39-3476-4f41-b7bb-3da6963e237b", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--844f6bfd-26af-4c70-b0fb-96bcfc467213", "target_ref": "x-misp-object--20b5b91c-4222-4eb4-bcb0-1d2b5d65c5af" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a63a030a-f2ef-43ce-ab0b-969828b19c0e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9e938956-b84c-4ad6-b6e9-c76e7c257f19", "target_ref": "x-misp-object--6bdce9b4-2073-493d-affe-89faec431d92" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1f82d2b1-a575-4b17-bee9-ec590f7b185e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1b4abf9b-20e1-4991-9a0f-fa6d85844664", "target_ref": "x-misp-object--707daa2e-319e-4217-9e9e-66961f0944f4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--40389401-5131-4798-81cb-77874c8b72f8", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3bff3fad-617f-469b-ab76-31ef8d37182f", "target_ref": "x-misp-object--84d87567-a187-4d13-8e8e-fe4968ec7317" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1512dc9c-4308-485b-a83d-84c0d3a65f0e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--299df689-5b87-4dfd-ace4-1a5fe47cf0ef", "target_ref": "x-misp-object--f0944434-11e8-4a3f-9db9-3712f278b0bd" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--fa84f629-f7fe-492c-b98a-7a4ffdb047b4", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--45436868-f318-44a7-80ef-cfc59e1b067a", "target_ref": "x-misp-object--fa571e37-157d-47a7-b2df-e512c796d8d0" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--70428124-b68d-4246-a00c-e11a4bebe40f", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7e0b9f43-bbfe-4c48-8bed-9a88843b88f3", "target_ref": "x-misp-object--eabe87b8-0d05-49a7-8df4-7611845f7b86" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--75ce5e64-cf0c-41db-b55d-eea09d906a04", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--35f19c22-bb54-4118-8e2a-a6d6b78fa536", "target_ref": "x-misp-object--f61a9f17-4183-432a-a0a9-34929221e1bf" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--05c30659-6ff8-414c-8ac5-6afb0042de1f", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9bd33707-6cad-4531-9575-2b257af4239e", "target_ref": "x-misp-object--97ca49c9-5479-48e1-b609-7bbde22a44a6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--04974d8e-d373-4d6b-a132-444c71983c8a", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7c7d0cab-6614-4d6e-844f-b96a60b80a05", "target_ref": "x-misp-object--e6de3c5f-55bc-47c9-9266-a8c981902df9" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--013dbaa5-382a-442e-a98d-7a9e1d563e07", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--647f4bff-0d89-4940-b1ff-f68625083a1c", "target_ref": "x-misp-object--af3a4fd1-9f79-401b-a42c-d05b1e190cae" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d5eb5a4c-6082-4c76-a553-5bf4b04ea712", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9fbbec2e-0c24-457a-b241-dd5313c196a8", "target_ref": "x-misp-object--2fa4890a-b3e8-4140-9c6a-ced8d3f1b4a7" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e559d0ee-2979-4ec1-b206-fa2378054b34", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3ad9b9d2-d784-42ae-b8c5-09d4ed4ae102", "target_ref": "x-misp-object--fcbdfa58-feca-47b8-8443-d6856341c139" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e62fd6be-841b-42e6-a2a0-16663dc83a59", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7dbc825d-6f73-4c96-8b7a-8cd5a9030b0d", "target_ref": "x-misp-object--319be5ee-9dbe-4d32-9558-174535d5eb76" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7e8949da-74b2-4030-8bef-19cc25866c49", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c60a6e18-6be9-41a5-af8b-044a261e8842", "target_ref": "x-misp-object--fec89932-b6e3-4f90-bfeb-b12aa3d8e4d6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0d8da211-dab2-4fb8-9032-00c015132ded", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8ebdeb3d-585a-402e-ac4c-e74d4e7e28b3", "target_ref": "x-misp-object--c4ed2cef-0abb-442d-a321-7f528925ef43" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1bef8d40-3a97-4b9a-82f8-dd597a393546", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a0ba4a94-ca04-4194-8f44-7e109a1d571d", "target_ref": "x-misp-object--90a85fa2-2cd3-44ed-9800-47036fbea5ed" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ec241aa3-3fa2-4677-bc65-cb56f110bbbb", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--448163b9-d56e-4197-b219-7701771f0b9f", "target_ref": "x-misp-object--edf1b1b2-a646-4d36-89fc-2bd73036558a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--72964bf9-9069-42a9-9a6c-1b9d331e07ec", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--e9731d60-0ae4-4dde-898e-cac8b04a92ae", "target_ref": "x-misp-object--e6bc3456-c3f9-4350-acc0-327d026ebb77" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--97bedba1-450d-45a0-964e-cd556282f3b6", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--398aa11c-cf88-4719-8a67-281a237f5842", "target_ref": "x-misp-object--06b39d87-d102-40a2-be42-99983372e8c2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--860171c5-2ffe-4abe-bbc0-51c030857c84", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--5df60d5d-8222-40a0-8283-c1b60986313f", "target_ref": "x-misp-object--5b646f32-311e-4fe3-b55f-ba211ee379fc" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--165af737-39f8-4de5-a89f-209a3787d1ae", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0657a83d-6055-4d0e-b18c-e66524986913", "target_ref": "x-misp-object--486237b5-0bca-4be0-b0a9-cf97bad7ec7e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--8e35a286-a296-4952-8b09-d6b79ebfb2a3", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8ff99259-70f6-4ec1-8b53-ec2640ff4f76", "target_ref": "x-misp-object--8e77f1b3-ff7e-4e6d-ad68-6908c1a0961d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d7d92a36-8bd3-47c6-a7c8-57c58bacfd61", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2e76b14d-770a-4609-b3b5-b5ea2d40411f", "target_ref": "x-misp-object--afab1a16-e49a-41dc-8cb3-00b0eb5056e1" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b21868f3-30bf-4916-8a2c-5e9cfa41ddc7", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3ef484d7-e18a-4268-9d64-57a0dc11ec90", "target_ref": "x-misp-object--23503f7a-ba91-4d93-aace-c0bfd9228e8a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--efd4c24f-1430-46dd-8a36-3a238b289d5f", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--20f652f2-5da6-4d98-a7ab-ca7e2f1a46d2", "target_ref": "x-misp-object--2891de56-5536-4798-beb4-ebe8f7d526f6" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--2a37c1d5-5975-48a0-bf6b-8857d6598bf3", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--94194fbd-1c7b-48a3-9397-78690a14965c", "target_ref": "x-misp-object--11e9099a-5624-4972-a948-fedaf267e4e4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--172ba3c8-0cee-47e3-b970-7b69773c253a", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--da3156db-d5bd-42c1-8acf-fcba17565f99", "target_ref": "x-misp-object--3c47eb42-f907-41c4-a214-ea3bea07bad4" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--796ac887-68b5-4296-927b-08aec4ad422c", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c6b32ce3-eb60-458e-a9c4-79c6323bf988", "target_ref": "x-misp-object--a3ed0c52-f5a7-4eca-b69d-7e6c7df2c44f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f73f20f4-c175-441e-ac1d-52aeb79b925d", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d2983ca3-9223-4a87-b04f-6de51ace37a7", "target_ref": "x-misp-object--eab302f5-7a18-4f5e-b606-4a7411472846" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--783c2773-e9c9-4ef4-b0df-dbf95d3cfaa2", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--522f5599-7a15-4eaf-bc74-74ad5dd77996", "target_ref": "x-misp-object--4cd9d948-55ef-4f84-8e84-b0eb3b3f63f8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c1b4679c-e6c0-4c88-8a9d-a4afd84fcb80", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--590167ef-b668-496f-8970-7bd7d16826bf", "target_ref": "x-misp-object--a8374917-93c1-457e-996e-c942d50f31d3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--6c1350b0-01c1-4152-90af-85bd5f995e72", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1f2972d3-a2b9-4e33-b097-362ad59cf22a", "target_ref": "x-misp-object--ea2bb670-0be4-494b-8513-325713ffa7b3" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--03ca4333-5efa-4aca-ae18-afdd75f5032c", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--878ff7cd-c5c0-4ad7-a9fc-9fac552d4b7a", "target_ref": "x-misp-object--7529b90e-54c5-43da-858e-524ab68604bb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--3fefdd9e-b977-4ea2-b9c4-5701b576ff9e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--d7304186-e248-49e9-a821-d4e1b2bfff31", "target_ref": "x-misp-object--2f5b67f5-2eb1-45a4-8067-e0619f071a9a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b3379a5e-b75f-4625-9ad4-36e2afc2155f", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--bcb35d45-3b99-4de3-952c-eaccba4124e5", "target_ref": "x-misp-object--ec28b665-f612-473f-9512-fd6f869b06fe" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e992ece8-a0fa-491c-8231-d3764d073b52", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8e934a55-9f8c-431c-85c8-f52a2574eb6d", "target_ref": "x-misp-object--93b3d657-1591-445c-9a59-22b998db2f98" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--46126427-11a6-42f7-87e0-a5fc9b2f48e3", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--61def0f6-fcdb-4c6c-9557-89fa5c3fd142", "target_ref": "x-misp-object--bb4fb207-7951-414d-ac6c-cc6ab057787c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e454cee5-b8e0-43d8-8a65-8d5c268813f1", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3688243c-dba5-4425-83df-05469b53270e", "target_ref": "x-misp-object--83e74766-26ae-4c43-b22c-d0f6f6871b9a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--70a441af-e2b8-47ab-82d4-41a53789c508", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9da3fb39-1b7f-45b9-9c2b-18f02edb7a13", "target_ref": "x-misp-object--984012d5-eb26-486d-ba47-720d981b8305" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e1b87877-0c85-41ff-bcc0-480e73c50a62", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8c2d5422-b02d-4ad5-9eda-e19b2f8520d3", "target_ref": "x-misp-object--1d8386a5-94a3-418f-bd81-ba11f4d870fe" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c2355c18-49cc-46d4-9e1e-5783ca894906", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7e5e847c-9c77-4184-8d70-9c5e59739b82", "target_ref": "x-misp-object--cb350869-f30b-4548-bd9f-9835eba3747a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--23734187-7e33-4cfb-9e51-f51348c206ca", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0cf779f9-164d-457d-ad04-ea623e3076d3", "target_ref": "x-misp-object--1197e5b8-cd16-493f-a5b8-8f9491c300f9" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--969b2246-da93-4ec6-8d12-b327aea994b4", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--7169c4a0-202c-4276-aa95-4209b3d9e92a", "target_ref": "x-misp-object--ac2f44f8-9449-4acb-8612-7068a7fb9c88" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c27a8693-b49f-486d-875d-92dbd4774044", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--39872eaa-fca6-44e8-942d-07104ec61f98", "target_ref": "x-misp-object--b5a4ef02-e2a8-4ff5-941f-82a9b7be9f9b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--9924c37b-2634-443d-aa48-a81ca8775d14", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--85318a94-ab67-4089-9af3-32be44d7c131", "target_ref": "x-misp-object--259af175-f2fb-4292-ba82-692fb829126d" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--85c1f7e0-5ade-4ea7-ad4e-0cde7949dc95", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--b16b9ea1-7e8a-4dd7-ace1-1ce87d453a89", "target_ref": "x-misp-object--a5ae663f-2dfa-4b90-bc5d-ead300eb2441" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--63166cb2-492b-4ffe-8b0e-d65767c46538", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4bada252-c578-43d6-9196-94b816fd373e", "target_ref": "x-misp-object--59a33fb7-bbfb-4df0-bade-05bd106312c2" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--a992fa96-7cf7-4a94-9f31-41e7fc37af11", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c09dc808-4138-4d16-9516-df61205371e0", "target_ref": "x-misp-object--56d3a112-940d-4480-85de-d34f6cd6ebdb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b18b7235-67aa-4d54-8a9e-7d391a2cd9f1", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3b583c88-393d-49f8-9b29-3773a8ee7f92", "target_ref": "x-misp-object--5fb79bae-c985-40ec-822e-48bcd90ef8f8" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--d9be2f7f-0204-43ff-9d3f-a08e1f944bed", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--0160b000-c718-4bc9-adc4-40fdaadbfe06", "target_ref": "x-misp-object--cf6f7ae6-d0d1-4846-bd3f-eada735297bb" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--7ead6e3d-7db5-4601-acfd-929b7f2bc19f", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2f72d335-4d2e-446b-b91c-9f3ec0c5825f", "target_ref": "x-misp-object--671d9a9c-557b-4954-afb7-84116dfaafdf" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--e0c63e04-db1c-4976-b995-e1484598c7f1", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--a5d51c54-9186-434c-9370-1b043a73527e", "target_ref": "x-misp-object--b1c3a402-f547-4396-982a-95a61fc14c24" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--feeda480-e2cf-42eb-b4b5-a0f130560efe", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--39ae68e0-13ea-4711-b214-3af059803286", "target_ref": "x-misp-object--36c61803-2877-405f-b6b0-5acbe905782e" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0141af36-f2ac-4625-9c5a-0cbd2f5fd3cb", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--2a42886a-67dc-44e5-bdec-bca5c3b4aaf3", "target_ref": "x-misp-object--09d1177b-e3e6-4f3d-925b-ac25620cad00" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--b2be88e7-8886-4161-b7af-a91d5a955eb7", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--be44f41e-6b44-4cc5-9f3d-8bf5755c4e91", "target_ref": "x-misp-object--90c6a983-0097-405d-816a-d7d0aa604363" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--c3076218-f449-40a1-a633-f807b67ffdb5", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--c2b35c06-e9fb-4bc9-be25-fc70417cedf4", "target_ref": "x-misp-object--8a87830e-ecc9-495e-84ba-a143f2bcd94f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ea07c3f8-8880-456c-9a46-82acf2c4b000", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--4e1bef3c-5152-40f7-b83f-b29b1737af98", "target_ref": "x-misp-object--6a445163-58d2-473d-9100-c9b17e1d420b" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--40d69940-61b2-40e6-90fb-b75d2f217f56", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--059a2690-75da-4ce5-aa90-f93ab97f530f", "target_ref": "x-misp-object--fbaaca08-1b6c-44c6-9aec-171935d04e5c" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0c107145-d85b-4645-81f0-252726c09b3e", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1e10c051-b1b1-44b5-9c28-8dd9e3752a6c", "target_ref": "x-misp-object--8dfb30ca-fe11-45b7-96df-67e092866720" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0de5b9f3-3deb-4b2e-b2b2-9bac7314551d", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--1253fc5b-4990-4d6b-957f-c0df3912a373", "target_ref": "x-misp-object--e186fa28-a483-46dc-841d-47cf32443adf" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--cfe06238-a2bf-40ba-b1e9-ac08bf3571d1", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--80f3ef4a-a9a5-4329-9597-21fb85287468", "target_ref": "x-misp-object--d6ecedb2-858f-4080-8238-1e674aaa6d83" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--0b4a7c5e-ca8e-4e08-a448-b3324d961842", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--9bfa8642-f8fe-4e9e-a37f-5d43e5aeaf03", "target_ref": "x-misp-object--9e583e66-b14c-47cb-815e-a0b0d1e85b4a" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--f0d1c8d5-f004-410c-8028-2f084d8216a3", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--ee861cc7-1104-4b21-8c06-d0f92bef929c", "target_ref": "x-misp-object--35cc2bf0-ecbe-4b5e-9db6-912ebeefb488" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--ef9fbbed-070d-4a14-982d-07e5e6e5cc2d", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3645e877-e229-407e-9b05-f50f5bc924de", "target_ref": "x-misp-object--b73a48db-798e-497b-9654-9467f848615f" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--afc6d9dd-0717-4395-aa0b-b94679cbaa00", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--8d9e3f84-afe5-459f-a511-733d0a6c73a1", "target_ref": "x-misp-object--f7bf32fc-5b23-410b-8f1d-0e5408c44680" }, { "type": "relationship", "spec_version": "2.1", "id": "relationship--1d9fe018-5761-4799-a977-19bc73851851", "created": "1970-01-01T00:00:00.000Z", "modified": "1970-01-01T00:00:00.000Z", "relationship_type": "analysed-with", "source_ref": "indicator--3fb984a2-e658-4433-a266-93ade5cca32b", "target_ref": "x-misp-object--c7153b15-1d40-4e08-908c-7c2a0d374c12" }, { "type": "marking-definition", "spec_version": "2.1", "id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9", "created": "2017-01-20T00:00:00.000Z", "definition_type": "tlp", "name": "TLP:WHITE", "definition": { "tlp": "white" } } ] }