misp-circl-feed/feeds/circl/stix-2.1/5aa7b639-62d8-46e6-be6c-4db8950d210f.json

67363 lines
No EOL
2.8 MiB

{
"type": "bundle",
"id": "bundle--5aa7b639-62d8-46e6-be6c-4db8950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "grouping",
"spec_version": "2.1",
"id": "grouping--5aa7b639-62d8-46e6-be6c-4db8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"name": "OSINT - Gozi ISFB Remains Active in 2018, Leverages \"Dark Cloud\" Botnet For Distribution",
"context": "suspicious-activity",
"object_refs": [
"observed-data--5aa7b644-9558-4b2b-8deb-4e74950d210f",
"url--5aa7b644-9558-4b2b-8deb-4e74950d210f",
"x-misp-attribute--5aa7b657-db9c-47d7-a90d-42cb950d210f",
"indicator--5aa7b6ea-f870-49de-abd4-4dd9950d210f",
"indicator--5aa7b6ea-2404-442b-8b73-4f6e950d210f",
"indicator--5aa7b6ea-76cc-45bc-aafa-4007950d210f",
"indicator--5aa7b6ea-714c-4e23-a4bb-45f6950d210f",
"indicator--5aa7b6ea-8148-4f2e-a8eb-4377950d210f",
"indicator--5aa7b6ea-826c-4e96-a3de-40ea950d210f",
"indicator--5aa7b6ea-1c70-4076-b9fa-4863950d210f",
"indicator--5aa7b6ea-1948-4b18-a208-49d1950d210f",
"indicator--5aa7b6ea-368c-4c37-b61d-4a93950d210f",
"indicator--5aa7b6ea-c3ac-411a-a6ab-4f86950d210f",
"indicator--5aa7b6ea-5518-4149-8a37-46bf950d210f",
"indicator--5aa7b6ea-149c-45ef-87ab-4bd4950d210f",
"indicator--5aa7b6ea-b544-43d5-8a8d-40f7950d210f",
"indicator--5aa7b6ea-80e4-4da8-b5c4-4045950d210f",
"indicator--5aa7b6ea-44b4-493d-8334-4127950d210f",
"indicator--5aa7b6ea-0244-4b14-8499-47f1950d210f",
"indicator--5aa7b6ea-9cac-481a-8908-4b15950d210f",
"indicator--5aa7b6ea-4a38-48f4-8738-49aa950d210f",
"indicator--5aa7b6ea-e054-4cc4-8229-4e39950d210f",
"indicator--5aa7b6ea-7cb0-4347-927b-41db950d210f",
"indicator--5aa7b6ea-07dc-4f64-bdf5-41a5950d210f",
"indicator--5aa7b6ea-a62c-43c4-aeff-4bb6950d210f",
"indicator--5aa7b6ea-66dc-4cec-b087-41eb950d210f",
"indicator--5aa7b6ea-2020-4a5b-beda-4e9b950d210f",
"indicator--5aa7b6ea-d4b4-4c4a-95de-4121950d210f",
"indicator--5aa7b6ea-7df4-409a-bd84-48f8950d210f",
"indicator--5aa7b6ea-4de0-478b-b15a-4aac950d210f",
"indicator--5aa7b6ea-0ef4-452d-a826-47df950d210f",
"indicator--5aa7b6ea-d06c-4ecc-b6eb-4e2c950d210f",
"indicator--5aa7b6ea-7560-41fb-9140-4984950d210f",
"indicator--5aa7b6ea-3610-4626-b558-47d4950d210f",
"indicator--5aa7b6ea-08b8-46c8-97d0-43ba950d210f",
"indicator--5aa7b6ea-9a88-4012-ac17-413a950d210f",
"indicator--5aa7b6ea-4b34-47cf-a040-4d5e950d210f",
"indicator--5aa7b6ea-e920-4a23-864b-44fd950d210f",
"indicator--5aa7b6ea-93f0-492f-99ed-40af950d210f",
"indicator--5aa7b6ea-26ec-4ccf-86d9-4671950d210f",
"indicator--5aa7b6ea-c7f8-4bcf-b395-4013950d210f",
"indicator--5aa7b6ea-6968-4622-a5f0-4764950d210f",
"indicator--5aa7b6ea-06f0-40a4-8571-4d36950d210f",
"indicator--5aa7b6ea-c930-4b44-ad5c-4c5f950d210f",
"indicator--5aa7b6ea-658c-480a-a11a-42ac950d210f",
"indicator--5aa7b6ea-182c-4d0c-89c7-4d03950d210f",
"indicator--5aa7b6ea-ab8c-4a40-9178-417b950d210f",
"indicator--5aa7b6ea-66c4-45fa-85b3-409f950d210f",
"indicator--5aa7b6ea-f6a0-4f95-80f1-4fe4950d210f",
"indicator--5aa7b6ea-9360-42ca-811d-4a7a950d210f",
"indicator--5aa7b6ea-5280-40cd-ae93-4305950d210f",
"indicator--5aa7b6ea-02c8-400a-8bad-4957950d210f",
"indicator--5aa7b6ea-b5cc-4ae3-98d7-4776950d210f",
"indicator--5aa7b6ea-5354-4329-98a4-4780950d210f",
"indicator--5aa7b6ea-f1a4-4087-bea3-4ea4950d210f",
"indicator--5aa7b6ea-9c10-471d-9443-40ce950d210f",
"indicator--5aa7b6ea-4bf4-445f-b06a-4709950d210f",
"indicator--5aa7b6ea-f6c4-4127-84d7-4481950d210f",
"indicator--5aa7b6ea-a900-45bb-8db5-43b5950d210f",
"indicator--5aa7b6ea-6564-4b4e-9457-4840950d210f",
"indicator--5aa7b6ea-1228-4f85-b81a-4cca950d210f",
"indicator--5aa7b6ea-c658-499f-9c7f-4639950d210f",
"indicator--5aa7b6ea-76a0-4f0b-852b-447a950d210f",
"indicator--5aa7b6ea-210c-4d26-9ba6-4f2e950d210f",
"indicator--5aa7b6ea-d730-4148-8525-4584950d210f",
"indicator--5aa7b6ea-86b0-4e44-9076-48e2950d210f",
"indicator--5aa7b6ea-2884-49e3-82ee-4a65950d210f",
"indicator--5aa7b6ea-c288-4e9f-8b61-4dbb950d210f",
"indicator--5aa7b6ea-7e88-4de9-891a-49aa950d210f",
"indicator--5aa7b6ea-20c0-4cb6-bfa1-40c5950d210f",
"indicator--5aa7b6ea-a41c-4020-b632-489c950d210f",
"indicator--5aa7b6ea-4d5c-4f2e-93b0-4093950d210f",
"indicator--5aa7b6ea-df90-4f4f-9b4e-4a63950d210f",
"indicator--5aa7b6ea-a4f0-4e81-8eec-4cca950d210f",
"indicator--5aa7b6ea-4340-4791-aee9-4be1950d210f",
"indicator--5aa7b6ea-0bc0-45ba-8b52-4403950d210f",
"indicator--5aa7b6ea-d120-45d7-afb8-4446950d210f",
"indicator--5aa7b6ea-8bf4-4e5b-a767-43d0950d210f",
"indicator--5aa7b6ea-4218-4619-877d-4d3a950d210f",
"indicator--5aa7b6ea-fbc0-4693-897d-4707950d210f",
"indicator--5aa7b6ea-adfc-419d-8938-403a950d210f",
"indicator--5aa7b6ea-3be4-4505-b752-414b950d210f",
"indicator--5aa7b6ea-f140-4cb8-ac2c-4f23950d210f",
"indicator--5aa7b6ea-8d38-4694-be68-425a950d210f",
"indicator--5aa7b6ea-7d90-4226-866c-4f3f950d210f",
"indicator--5aa7b6ea-52f4-4f1f-9b8b-4b42950d210f",
"indicator--5aa7b6ea-3348-41fd-bcef-4281950d210f",
"indicator--5aa7b6ea-59ec-4d83-81a7-4c2e950d210f",
"indicator--5aa7b6ea-9224-4151-bd6c-45ee950d210f",
"indicator--5aa7b6ea-d09c-431a-a9cd-4fcf950d210f",
"indicator--5aa7b6ea-06e0-47e9-a955-4398950d210f",
"indicator--5aa7b6ea-3f18-4b5f-8034-4cff950d210f",
"indicator--5aa7b6ea-1b84-42e5-9a18-4a08950d210f",
"indicator--5aa7b6ea-c208-4996-88e0-4f17950d210f",
"indicator--5aa7b6ea-7700-482c-b0d8-47d7950d210f",
"indicator--5aa7b6ea-1de8-473c-b68f-4e87950d210f",
"indicator--5aa7b6ea-cb10-4724-b192-427b950d210f",
"indicator--5aa7b6ea-7e78-4824-ad94-441b950d210f",
"indicator--5aa7b6ea-35c8-49d2-ab37-49e6950d210f",
"indicator--5aa7b6ea-04ec-4be5-ac44-4875950d210f",
"indicator--5aa7b6ea-a468-461c-a765-4c07950d210f",
"indicator--5aa7b6ea-48f8-4593-b032-4597950d210f",
"indicator--5aa7b6ea-e6e4-4330-ba5e-45ff950d210f",
"indicator--5aa7b6ea-9344-4470-ac4b-43ed950d210f",
"indicator--5aa7b6ea-2a8c-4b72-ae25-4ec5950d210f",
"indicator--5aa7b6ea-d23c-450d-ac23-4b07950d210f",
"indicator--5aa7b6ea-7e9c-4adb-b5cf-4aca950d210f",
"indicator--5aa7b6ea-2520-468f-8dd7-4b88950d210f",
"indicator--5aa7b6ea-dc70-4aa9-aa01-4549950d210f",
"indicator--5aa7b6ea-4f64-4203-9685-4875950d210f",
"indicator--5aa7b6ea-d324-4d72-960c-482b950d210f",
"indicator--5aa7b6ea-6170-481b-b9c1-4ad2950d210f",
"indicator--5aa7b6ea-0024-473a-9229-4f4c950d210f",
"indicator--5aa7b6ea-9dac-41d9-a065-493c950d210f",
"indicator--5aa7b6ea-0b8c-4f2b-b3dd-45d4950d210f",
"indicator--5aa7b6ea-9654-4488-a98d-4dbf950d210f",
"indicator--5aa7b6ea-4f98-4153-87cb-4ba4950d210f",
"indicator--5aa7b6ea-d998-4817-af13-43d0950d210f",
"indicator--5aa7b6ea-92dc-4b7c-a3a9-4e94950d210f",
"indicator--5aa7b6ea-4964-4b03-b190-4a5d950d210f",
"indicator--5aa7b6ea-deb8-4262-b433-40b9950d210f",
"indicator--5aa7b6ea-70ec-4d5e-a17c-43c0950d210f",
"indicator--5aa7b6ea-251c-4484-8cad-4485950d210f",
"indicator--5aa7b6ea-be58-47f9-878d-486d950d210f",
"indicator--5aa7b6ea-6540-4c46-82f0-4d16950d210f",
"indicator--5aa7b6ea-e388-4170-aa6b-41a7950d210f",
"indicator--5aa7b6ea-7300-4e41-9200-48bc950d210f",
"indicator--5aa7b6ea-1218-4524-8f7d-4005950d210f",
"indicator--5aa7b6ea-b518-478d-aa5c-494b950d210f",
"indicator--5aa7b6ea-5b38-45ff-8dbe-4ab4950d210f",
"indicator--5aa7b6ea-fb18-4c6e-8ae7-4d8f950d210f",
"indicator--5aa7b6ea-7708-4cc2-b7b9-4057950d210f",
"indicator--5aa7b6ea-1a6c-4d06-b495-431e950d210f",
"indicator--5aa7b6ea-8a40-4411-ad8e-457a950d210f",
"indicator--5aa7b6ea-0f2c-4df5-8dde-4cf7950d210f",
"indicator--5aa7b6ea-898c-4a7a-8b78-400f950d210f",
"indicator--5aa7b6ea-0900-4552-9ef3-471a950d210f",
"indicator--5aa7b6ea-8748-499b-94b6-4c18950d210f",
"indicator--5aa7b6ea-29e4-4bab-b903-4a4c950d210f",
"indicator--5aa7b6ea-a4a8-42dc-b522-40a8950d210f",
"indicator--5aa7b6ea-4bf4-4765-b725-4d3a950d210f",
"indicator--5aa7b6ea-4548-4c1f-80d7-432d950d210f",
"indicator--5aa7b6ea-c458-48cd-85b2-4cfe950d210f",
"indicator--5aa7b6ea-59ac-4841-a55e-45ca950d210f",
"indicator--5aa7b6ea-e3ac-46fe-a8e7-4200950d210f",
"indicator--5aa7b6ea-770c-4027-a091-4f65950d210f",
"indicator--5aa7b6ea-2560-4b98-a78d-4145950d210f",
"indicator--5aa7b6ea-b6cc-40fa-9f5a-47c3950d210f",
"indicator--5aa7b6ea-4e78-43cd-bd3e-4d54950d210f",
"indicator--5aa7b6ea-b6e0-410c-94b4-44a7950d210f",
"indicator--5aa7b6ea-290c-4434-9b8b-4328950d210f",
"indicator--5aa7b6ea-9c64-4320-b308-4873950d210f",
"indicator--5aa7b6ea-d2a8-48f0-ad1c-4722950d210f",
"indicator--5aa7b6ea-c42c-42d4-938b-4eea950d210f",
"indicator--5aa7b6ea-866c-45d2-bde5-405c950d210f",
"indicator--5aa7b6ea-4e88-4725-81c3-4e42950d210f",
"indicator--5aa7b6ea-2b58-482e-9fde-4e61950d210f",
"indicator--5aa7b6ea-eec4-4dd8-8db2-467b950d210f",
"indicator--5aa7b6ea-c2fc-435a-a186-4bbf950d210f",
"indicator--5aa7b6ea-6ef8-4d1e-8f32-49ab950d210f",
"indicator--5aa7b6ea-0514-4fee-bf75-4108950d210f",
"indicator--5aa7b6ea-b2a0-4437-9269-4361950d210f",
"indicator--5aa7b6ea-4a4c-4bca-8b06-4d88950d210f",
"indicator--5aa7b6ea-ddac-4c47-a376-4ee6950d210f",
"indicator--5aa7b6ea-84f8-41bd-b764-4c25950d210f",
"indicator--5aa7b6ea-1920-4bcc-b945-41ae950d210f",
"indicator--5aa7b6ea-93e4-4947-99a5-4bea950d210f",
"indicator--5aa7b6ea-1fd8-44de-b5ed-4e96950d210f",
"indicator--5aa7b6ea-ba40-42e6-89ae-425d950d210f",
"indicator--5aa7b6ea-4e04-40e4-ae9f-4a14950d210f",
"indicator--5aa7b6ea-d9f8-4bd7-ae5a-4e27950d210f",
"indicator--5aa7b6ea-7014-478a-a6d0-4862950d210f",
"indicator--5aa7b6ea-fcd0-44a2-85ad-4790950d210f",
"indicator--5aa7b6ea-8ab8-45a9-8e38-4331950d210f",
"indicator--5aa7b6ea-0d4c-46e7-aeaf-4b1c950d210f",
"indicator--5aa7b6ea-9bfc-4e2e-aa1a-4548950d210f",
"indicator--5aa7b6ea-3344-4bbb-937a-43a9950d210f",
"indicator--5aa7b6ea-c258-4cc5-9832-4006950d210f",
"indicator--5aa7b6ea-57ac-41e7-a3ff-4614950d210f",
"indicator--5aa7b6ea-e148-463c-9894-4aee950d210f",
"indicator--5aa7b6ea-9e74-45d1-b7ff-4bc3950d210f",
"indicator--5aa7b6ea-3364-45d6-bff0-4e39950d210f",
"indicator--5aa7b6ea-c91c-4110-8559-4be2950d210f",
"indicator--5aa7b6ea-7b58-428b-ac68-49ec950d210f",
"indicator--5aa7b6ea-1fe8-436b-86c4-4df9950d210f",
"indicator--5aa7b6ea-c8c4-4b2d-a50f-4efa950d210f",
"indicator--5aa7b6ea-5b5c-403d-8d2b-4f05950d210f",
"indicator--5aa7b6ea-f880-4cbe-a2dc-4366950d210f",
"indicator--5aa7b6ea-b2f0-4cb9-9e81-4cc4950d210f",
"indicator--5aa7b6ea-6f54-4307-8757-400d950d210f",
"indicator--5aa7b6ea-15d8-44d3-973a-4bff950d210f",
"indicator--5aa7b6ea-a5b4-426c-bee2-434e950d210f",
"indicator--5aa7b6ea-4274-400d-9538-4ccd950d210f",
"indicator--5aa7b6ea-da20-4a47-97a8-42c7950d210f",
"indicator--5aa7b6ea-6678-498e-a7ec-49fe950d210f",
"indicator--5aa7b6ea-f078-4f03-bd9f-419c950d210f",
"indicator--5aa7b6ea-8180-4bca-8961-49e5950d210f",
"indicator--5aa7b6ea-1d78-41c9-9040-4eb3950d210f",
"indicator--5aa7b6ea-a32c-4cd7-9a9d-492a950d210f",
"indicator--5aa7b6ea-2fe8-43e6-834e-4af1950d210f",
"indicator--5aa7b6ea-b470-49d3-8e5a-4350950d210f",
"indicator--5aa7b6ea-42bc-4775-893d-4fc7950d210f",
"indicator--5aa7b6ea-cc58-4f5b-9987-42ac950d210f",
"indicator--5aa7b6ea-4cf8-4ff1-a660-4271950d210f",
"indicator--5aa7b6ea-ce60-4e35-ad65-44b3950d210f",
"indicator--5aa7b6ea-6800-4a6e-8df0-43d5950d210f",
"indicator--5aa7b6ea-e7d8-4cdd-8926-471b950d210f",
"indicator--5aa7b6ea-8434-44f4-9140-47ef950d210f",
"indicator--5aa7b6ea-0d6c-4d1f-857d-4192950d210f",
"indicator--5aa7b6ea-9320-4dc8-9881-417d950d210f",
"indicator--5aa7b6ea-0fd8-4901-b8bc-4743950d210f",
"indicator--5aa7b6ea-af54-4fd5-8f44-4755950d210f",
"indicator--5aa7b6ea-4cdc-4c75-85a4-4819950d210f",
"indicator--5aa7b6ea-fb30-41c1-917c-499f950d210f",
"indicator--5aa7b6ea-9ca0-458f-8aab-466e950d210f",
"indicator--5aa7b6ea-46a8-4640-9263-4e1a950d210f",
"indicator--5aa7b6ea-eebc-4b0a-9342-4791950d210f",
"indicator--5aa7b6ea-8f64-4c18-8a30-4c7e950d210f",
"indicator--5aa7b6ea-3a34-4048-a73a-4f60950d210f",
"indicator--5aa7b6ea-ddfc-4991-a1da-4137950d210f",
"indicator--5aa7b6ea-6d74-4b8f-a4cc-4c1f950d210f",
"indicator--5aa7b6ea-f0d0-44aa-8e51-4dc5950d210f",
"indicator--5aa7b6ea-6874-487d-b518-4dcb950d210f",
"indicator--5aa7b6ea-0dcc-4a16-9418-4aa8950d210f",
"indicator--5aa7b6ea-a514-4ef9-b6e6-42e5950d210f",
"indicator--5aa7b6ea-7d34-4276-9a9e-4def950d210f",
"indicator--5aa7b6ea-b1e8-471f-b8e0-4e24950d210f",
"indicator--5aa7b6ea-e638-4df9-8eb4-48b2950d210f",
"indicator--5aa7b6ea-0f98-442a-8de5-4910950d210f",
"indicator--5aa7b6ea-412c-4af1-b8a0-4f85950d210f",
"indicator--5aa7b6ea-6514-4125-a3b8-407e950d210f",
"indicator--5aa7b6ea-5440-4413-a621-44c2950d210f",
"indicator--5aa7b6ea-f934-4871-9673-4e93950d210f",
"indicator--5aa7b6ea-7d58-43f4-87a2-49c8950d210f",
"indicator--5aa7b6ea-175c-4ad1-a528-4722950d210f",
"indicator--5aa7b6ea-c164-400b-b5c6-4aec950d210f",
"indicator--5aa7b6ea-6978-490a-b2a6-45f2950d210f",
"indicator--5aa7b6ea-13e4-4613-a8f3-476d950d210f",
"indicator--5aa7b6ea-c300-4296-8ac2-480f950d210f",
"indicator--5aa7b6ea-6600-46b2-966a-43e4950d210f",
"indicator--5aa7b6ea-0a90-4d0c-8a92-404f950d210f",
"indicator--5aa7b6ea-b434-4010-a94b-48b1950d210f",
"indicator--5aa7b6ea-56d0-4a93-a3a4-4ef7950d210f",
"indicator--5aa7b6ea-f0d4-4d5d-bebb-4b80950d210f",
"indicator--5aa7b6ea-8ccc-43bf-81b0-43d7950d210f",
"indicator--5aa7b6ea-3418-4fef-ab5e-4221950d210f",
"indicator--5aa7b6ea-d268-4960-8b2b-4f87950d210f",
"indicator--5aa7b6ea-888c-4bb9-9a84-461f950d210f",
"indicator--5aa7b6ea-28d0-41d8-98a2-4883950d210f",
"indicator--5aa7b6ea-db70-4309-9090-4ac3950d210f",
"indicator--5aa7b6ea-7768-4b41-a8cc-41b0950d210f",
"indicator--5aa7b6ea-1810-43d7-8640-4256950d210f",
"indicator--5aa7b6ea-c664-42d9-af12-4914950d210f",
"indicator--5aa7b6ea-70d0-4408-b5aa-4938950d210f",
"indicator--5aa7b6ea-1c68-493e-b802-4674950d210f",
"indicator--5aa7b6ea-c0f8-4ad3-94a3-4b01950d210f",
"indicator--5aa7b6ea-5f48-4635-84c3-441f950d210f",
"indicator--5aa7b6ea-fd98-462d-9fb7-4170950d210f",
"indicator--5aa7b6ea-9418-4e6b-aa63-4205950d210f",
"indicator--5aa7b6ea-1e7c-4378-95ad-4274950d210f",
"indicator--5aa7b6ea-b3d0-4bc4-974e-43d2950d210f",
"indicator--5aa7b759-f5f0-4a5b-a25e-4604950d210f",
"indicator--5aa7b6ea-4280-4041-9376-4768950d210f",
"indicator--5aa7b759-de14-4e64-b677-4d97950d210f",
"indicator--5aa7b6ea-ca8c-45b9-905d-4975950d210f",
"indicator--5aa7b759-67b0-49a0-8b59-40c0950d210f",
"indicator--5aa7b6ea-561c-4125-9cbc-48cc950d210f",
"indicator--5aa7b759-ec9c-47ae-ae64-48c5950d210f",
"indicator--5aa7b6ea-d464-413b-9828-498d950d210f",
"indicator--5aa7b759-6f94-4af2-83ef-4778950d210f",
"indicator--5aa7b6ea-4ec4-41e6-9474-4103950d210f",
"indicator--5aa7b759-f41c-4f5a-9e3f-4e78950d210f",
"indicator--5aa7b6ea-eb20-4a0d-ae3f-4aa9950d210f",
"indicator--5aa7b759-8010-4aaf-a177-4864950d210f",
"indicator--5aa7b6ea-6e18-4a1c-8398-4db8950d210f",
"indicator--5aa7b759-04fc-4910-9db4-415e950d210f",
"indicator--5aa7b6ea-0114-47b8-a84f-468a950d210f",
"indicator--5aa7b759-985c-4521-8f56-442f950d210f",
"indicator--5aa7b6ea-b030-482d-a75c-469b950d210f",
"indicator--5aa7b759-3cec-477e-b08d-4aae950d210f",
"indicator--5aa7b6ea-5394-46f3-9a7e-4c75950d210f",
"indicator--5aa7b759-c2a0-41dd-bd3a-43c5950d210f",
"indicator--5aa7b6ea-f824-498f-91b0-4974950d210f",
"indicator--5aa7b759-5344-4075-a623-4de1950d210f",
"indicator--5aa7b6ea-8cb0-4863-9f15-4b24950d210f",
"indicator--5aa7b759-e064-43a6-929e-4be9950d210f",
"indicator--5aa7b6ea-2d58-44ea-98f4-4919950d210f",
"indicator--5aa7b759-6ac8-4920-83a5-406e950d210f",
"indicator--5aa7b6ea-c9b4-436b-b862-4387950d210f",
"indicator--5aa7b759-eeec-4109-9ab8-41e8950d210f",
"indicator--5aa7b6ea-3348-4924-8d98-4450950d210f",
"indicator--5aa7b759-5d30-46db-a952-4e87950d210f",
"indicator--5aa7b6ea-ac7c-46d9-9a2f-49de950d210f",
"indicator--5aa7b759-de98-4e28-b9da-45de950d210f",
"indicator--5aa7b6ea-2e48-4582-8c25-4643950d210f",
"indicator--5aa7b759-50c4-4315-bbf0-46d3950d210f",
"indicator--5aa7b6ea-b26c-482c-b3ff-4648950d210f",
"indicator--5aa7b759-dde4-4cca-97c2-4bd9950d210f",
"indicator--5aa7b6ea-2b3c-4cf7-8610-4600950d210f",
"indicator--5aa7b759-4c28-41da-a411-4b3d950d210f",
"indicator--5aa7b6ea-b604-4467-8f7f-4935950d210f",
"indicator--5aa7b759-e884-474d-aad9-4c71950d210f",
"indicator--5aa7b6ea-4324-4a47-a067-4d4b950d210f",
"indicator--5aa7b759-77fc-431f-8d88-4d1b950d210f",
"indicator--5aa7b6ea-ceb4-47c8-b501-4927950d210f",
"indicator--5aa7b759-04b8-4708-861a-4a77950d210f",
"indicator--5aa7b6ea-53a0-43b7-b282-4456950d210f",
"indicator--5aa7b759-91d8-41ea-942f-48e0950d210f",
"indicator--5aa7b6ea-d184-4edc-bc54-427e950d210f",
"indicator--5aa7b759-10e8-4ace-b02c-4cda950d210f",
"indicator--5aa7b6eb-7a20-4dc1-ad0c-40f7950d210f",
"indicator--5aa7b759-8314-46ee-96be-4760950d210f",
"indicator--5aa7b6eb-f930-403c-a562-4d54950d210f",
"indicator--5aa7b759-0864-4818-8f52-4e56950d210f",
"indicator--5aa7b6eb-73f4-404b-86ed-4053950d210f",
"indicator--5aa7b759-9584-450f-b687-4ba9950d210f",
"indicator--5aa7b6eb-f2a0-4594-acf7-43ba950d210f",
"indicator--5aa7b759-281c-4ddf-961a-4e9d950d210f",
"indicator--5aa7b6eb-8218-427b-8733-486c950d210f",
"indicator--5aa7b759-b604-43a1-ac6c-4e2a950d210f",
"indicator--5aa7b6eb-1ce4-434a-849e-4b31950d210f",
"indicator--5aa7b759-4770-4213-80a4-45d2950d210f",
"indicator--5aa7b6eb-ad88-42e9-ab32-4368950d210f",
"indicator--5aa7b759-b67c-44c4-8f6d-4a8f950d210f",
"indicator--5aa7b6eb-46c4-4d3b-b79a-48d5950d210f",
"indicator--5aa7b759-2970-4f1e-befa-4e78950d210f",
"indicator--5aa7b6eb-d5d8-4cc7-bd8b-4c05950d210f",
"indicator--5aa7b759-bec4-497d-96e8-451e950d210f",
"indicator--5aa7b6eb-5f10-439a-990a-4f6f950d210f",
"indicator--5aa7b759-4a54-455d-bc42-47a4950d210f",
"indicator--5aa7b6eb-c070-4c66-9d39-4b7b950d210f",
"indicator--5aa7b759-e3f4-4320-9b52-4105950d210f",
"indicator--5aa7b759-7c68-4f52-8c34-4baa950d210f",
"indicator--5aa7b6eb-33c8-4424-8c0a-4f3d950d210f",
"indicator--5aa7b759-22ec-4f31-810e-4460950d210f",
"indicator--5aa7b6eb-c534-41f8-b815-4331950d210f",
"indicator--5aa7b6eb-437c-48d7-8768-49b8950d210f",
"indicator--5aa7b759-c13c-4e64-aa23-4682950d210f",
"indicator--5aa7b759-5dfc-4d9b-936e-4bd3950d210f",
"indicator--5aa7b6eb-c3b8-4fd7-8a37-45ee950d210f",
"indicator--5aa7b780-58b8-4baa-bf9a-4633950d210f",
"indicator--5aa7b780-5270-4f42-8018-403f950d210f",
"indicator--5aa7b780-d2ac-4b6f-8a39-4ed4950d210f",
"indicator--5aa7b780-4ca8-482c-8b68-410a950d210f",
"indicator--5aa7b780-e51c-4966-87f1-47b6950d210f",
"indicator--5aa7b780-6170-4d46-a4fd-4fae950d210f",
"indicator--5aa7b780-dd60-441a-b64a-4736950d210f",
"indicator--5aa7b780-4e60-4edc-a3bc-44c9950d210f",
"indicator--5aa7b780-c2e4-4c81-95a9-492d950d210f",
"indicator--5aa7b780-5450-40f2-ae74-4320950d210f",
"indicator--5aa7b780-bb8c-4c29-89df-49f2950d210f",
"indicator--5aa7b780-2264-4db3-ae6e-44bc950d210f",
"indicator--5aa7b780-8554-40c8-8af2-4bb0950d210f",
"indicator--5aa7b780-3538-4b67-bbf6-464f950d210f",
"indicator--5aa7b780-58bc-455f-ae78-4f58950d210f",
"indicator--5aa7b780-3b68-4311-80f6-4971950d210f",
"indicator--5aa7b780-a7b8-46a2-ab13-4613950d210f",
"indicator--5aa7b780-1b10-4f66-b76e-4fb5950d210f",
"indicator--5aa7b780-8440-48a7-b027-4f93950d210f",
"indicator--5aa7b780-fcac-473c-95aa-4bed950d210f",
"indicator--5aa7b780-6af0-401b-acec-40c7950d210f",
"indicator--5aa7b780-cd18-4755-a2da-44f1950d210f",
"indicator--5aa7b780-3328-48ff-8d7b-4b96950d210f",
"indicator--5aa7b780-a3c4-4c09-b296-4735950d210f",
"indicator--5aa7b780-09d4-4972-8b33-48d8950d210f",
"indicator--5aa7b780-6d28-4331-a467-4e47950d210f",
"indicator--5aa7b780-49f8-498a-b20b-4404950d210f",
"indicator--5aa7b780-e43c-4dce-8721-4622950d210f",
"indicator--5aa7b780-7ee4-4f4c-82f7-41c6950d210f",
"indicator--5aa7b780-adbc-489b-8565-4bfc950d210f",
"indicator--5aa7b780-31e0-4418-85bd-4c3d950d210f",
"indicator--5aa7b780-ae34-49da-a051-433a950d210f",
"indicator--5aa7b780-4f40-4d27-adaf-4f56950d210f",
"indicator--5aa7b780-cacc-4f4a-865d-40b2950d210f",
"indicator--5aa7b780-50e4-4530-a16b-486a950d210f",
"indicator--5aa7b780-da80-4f4e-83bd-4450950d210f",
"indicator--5aa7b780-6d18-4945-9013-49c4950d210f",
"indicator--5aa7b780-d648-49a1-a1b7-42e6950d210f",
"indicator--5aa7b780-3230-4c30-aaea-419a950d210f",
"indicator--5aa7b780-9cf0-4d70-881c-4a90950d210f",
"indicator--5aa7b780-f748-4af9-bbb7-49e7950d210f",
"indicator--5aa7b780-739c-4dee-a39a-4aa1950d210f",
"indicator--5aa7b780-d8e4-43d4-b67f-4995950d210f",
"indicator--5aa7b780-52e0-4863-b0e9-4fe2950d210f",
"indicator--5aa7b780-d768-4630-8e6d-4309950d210f",
"indicator--5aa7b780-58d0-4e30-9b69-45a9950d210f",
"indicator--5aa7b780-bc88-4239-8b95-46b8950d210f",
"indicator--5aa7b780-27ac-43d4-9bfa-4316950d210f",
"indicator--5aa7b780-7e80-4045-9459-404c950d210f",
"indicator--5aa7b780-d234-4bdb-9865-4f92950d210f",
"indicator--5aa7b780-23f4-4227-a935-4bc2950d210f",
"indicator--5aa7b780-8a04-4753-a29e-42fd950d210f",
"indicator--5aa7b780-e970-495a-85cc-407e950d210f",
"indicator--5aa7b780-4878-4cf4-b991-42df950d210f",
"indicator--5aa7b780-ac30-4cdf-968b-4bfd950d210f",
"indicator--5aa7b780-28e8-4fbc-ae5c-4c3f950d210f",
"indicator--5aa7b780-b0f4-4f6a-a583-47e9950d210f",
"indicator--5aa7b780-6bc8-413b-99b0-4779950d210f",
"indicator--5aa7b780-0888-4b8c-aa72-4235950d210f",
"indicator--5aa7b780-9224-45ca-9d2c-462b950d210f",
"indicator--5aa7b780-1648-418f-9a9a-4d58950d210f",
"indicator--5aa7b780-9b34-422e-b7fe-4b62950d210f",
"indicator--5aa7b780-19e0-40e1-9213-4157950d210f",
"indicator--5aa7b79b-639c-4300-bb85-4de6950d210f",
"indicator--5aa7b780-a5d4-4a9c-ba00-4e67950d210f",
"indicator--5aa7b79b-0cdc-45e4-930d-431a950d210f",
"indicator--5aa7b780-33bc-49fe-bffd-42a0950d210f",
"indicator--5aa7b79b-8480-43f7-be90-4c66950d210f",
"indicator--5aa7b780-bcf4-48c6-87df-4d88950d210f",
"indicator--5aa7b79b-f008-41c4-b61e-4040950d210f",
"indicator--5aa7b780-4438-4fa5-8551-4682950d210f",
"indicator--5aa7b79b-4e48-4efe-a46d-4e42950d210f",
"indicator--5aa7b780-db1c-431d-8932-4b44950d210f",
"indicator--5aa7b780-8588-4e27-95a3-4e4f950d210f",
"indicator--5aa7b79b-a9cc-4682-9451-4cc8950d210f",
"indicator--5aa7b780-06f0-4255-ae08-45f8950d210f",
"indicator--5aa7b79b-1b30-48a3-86bd-42d0950d210f",
"indicator--5aa7b780-6e2c-477f-ac93-46d5950d210f",
"indicator--5aa7b79b-7844-49cc-ab9f-4203950d210f",
"indicator--5aa7b780-e120-4816-b6b5-483b950d210f",
"indicator--5aa7b79b-5ce4-4078-850e-4225950d210f",
"indicator--5aa7b780-5158-4c23-8fe2-4ddc950d210f",
"indicator--5aa7b79b-b2f0-4f95-a7c0-4aaf950d210f",
"indicator--5aa7b780-cc80-462c-a089-4e96950d210f",
"indicator--5aa7b79b-b860-491e-814d-4cf9950d210f",
"indicator--5aa7b780-480c-401e-bab4-492d950d210f",
"indicator--5aa7b79b-ca50-4462-a13e-4ec7950d210f",
"indicator--5aa7b780-c398-4685-af97-42ab950d210f",
"indicator--5aa7b79b-ef64-41fd-b7c6-450a950d210f",
"indicator--5aa7b780-61e8-4981-8e0f-4430950d210f",
"indicator--5aa7b79b-06cc-4f04-be98-4292950d210f",
"indicator--5aa7b780-bb78-4bf9-982b-45ca950d210f",
"indicator--5aa7b79b-172c-4ef8-bf92-4526950d210f",
"indicator--5aa7b780-35d8-4e74-9dd5-4034950d210f",
"indicator--5aa7b79b-020c-4fe6-8db1-4da1950d210f",
"indicator--5aa7b780-a098-4f95-8672-483c950d210f",
"indicator--5aa7b79b-03f8-4688-b729-4853950d210f",
"indicator--5aa7b780-2200-4092-bac0-4ee7950d210f",
"indicator--5aa7b79b-fbbc-4c6c-9e36-4b73950d210f",
"indicator--5aa7b780-b178-4906-a02a-4de7950d210f",
"indicator--5aa7b79b-2f44-413a-8bb2-4d29950d210f",
"indicator--5aa7b780-fe88-4bf6-a95b-43ea950d210f",
"indicator--5aa7b79b-9b70-4642-849d-4205950d210f",
"indicator--5aa7b780-56ec-4367-bcb7-44ef950d210f",
"indicator--5aa7b79b-ac98-4179-ad53-4283950d210f",
"indicator--5aa7b780-dd68-464f-b1bc-4cf0950d210f",
"indicator--5aa7b79b-bbcc-47a9-9948-4ef5950d210f",
"indicator--5aa7b780-550c-410e-91a1-4b7d950d210f",
"indicator--5aa7b79b-da3c-4b77-b4be-4726950d210f",
"indicator--5aa7b780-f35c-44c9-a88e-4b9a950d210f",
"indicator--5aa7b79b-0dc4-4a25-9c28-4d32950d210f",
"indicator--5aa7b780-5a98-4a79-b99d-4ff5950d210f",
"indicator--5aa7b79b-2e28-4875-b206-4cff950d210f",
"indicator--5aa7b780-a938-4085-bdf3-41c5950d210f",
"indicator--5aa7b79b-3e24-4d46-8ca7-47f9950d210f",
"indicator--5aa7b79b-6fb8-43dc-928b-4988950d210f",
"indicator--5aa7b780-1cf4-47b7-a561-44c7950d210f",
"indicator--5aa7b79b-7208-442a-b8db-4055950d210f",
"indicator--5aa7b780-8cc8-4d55-8f93-4786950d210f",
"indicator--5aa7b79b-6e7c-4bfb-a832-4c89950d210f",
"indicator--5aa7b780-05fc-44c2-a57e-42f8950d210f",
"indicator--5aa7b79b-7004-4dbc-bd4d-4256950d210f",
"indicator--5aa7b780-7cd8-4c06-ba05-43cd950d210f",
"indicator--5aa7b79b-8190-4a84-a4a7-4ea8950d210f",
"indicator--5aa7b780-f670-4829-b7e1-4681950d210f",
"indicator--5aa7b79b-8f98-478a-9c90-4284950d210f",
"indicator--5aa7b780-8070-4a44-8dff-43b9950d210f",
"indicator--5aa7b79b-aa20-4bcb-bb76-470f950d210f",
"indicator--5aa7b780-0368-46dd-b7c9-4f9b950d210f",
"indicator--5aa7b79b-b3dc-4871-8e24-468d950d210f",
"indicator--5aa7b780-8ca0-4826-9841-4afe950d210f",
"indicator--5aa7b79b-c374-435f-ad18-48cd950d210f",
"indicator--5aa7b780-118c-4001-8ec1-4717950d210f",
"indicator--5aa7b79b-c5c4-459c-ac3a-4a1c950d210f",
"indicator--5aa7b780-8d7c-472a-ac34-45bd950d210f",
"indicator--5aa7b79b-d048-4a75-b588-4f1f950d210f",
"indicator--5aa7b780-0afc-408d-a749-45ce950d210f",
"indicator--5aa7b79b-c8d4-45e6-a957-4d2b950d210f",
"indicator--5aa7b780-936c-43c2-bd83-418f950d210f",
"indicator--5aa7b79b-c228-45d9-a478-4eb8950d210f",
"indicator--5aa7b780-0a48-40bf-af86-4b40950d210f",
"indicator--5aa7b79b-c0f4-4c9f-a8a1-4880950d210f",
"indicator--5aa7b780-51e0-4c96-a9ee-4b7e950d210f",
"indicator--5aa7b79b-bca0-47c8-9580-4f07950d210f",
"indicator--5aa7b780-afbc-4bcd-a09a-4563950d210f",
"indicator--5aa7b79b-bfb8-4722-af5c-491f950d210f",
"indicator--5aa7b780-3958-4432-9495-4c03950d210f",
"indicator--5aa7b79b-d1a8-421c-95b0-4546950d210f",
"indicator--5aa7b79b-ecf8-43bd-9d34-49d9950d210f",
"indicator--5aa7b780-ae40-414a-9f0c-45dc950d210f",
"indicator--5aa7b780-2648-4894-9560-43d9950d210f",
"indicator--5aa7b79b-f074-42ed-8604-4d07950d210f",
"indicator--5aa7b780-87a8-448e-b259-403b950d210f",
"indicator--5aa7b79b-e2c0-42f1-89df-4e60950d210f",
"indicator--5aa7b780-05f0-4c69-a145-437e950d210f",
"indicator--5aa7b79b-e574-49fc-ad99-4371950d210f",
"indicator--5aa7b79b-e7c4-4a98-bff4-4ac3950d210f",
"indicator--5aa7b780-7d94-488e-85f7-4f9c950d210f",
"indicator--5aa7b79b-cb9c-457a-ae82-4447950d210f",
"indicator--5aa7b780-f7f4-4c54-944f-4d5b950d210f",
"indicator--5aa7b79b-99f8-4c63-9665-4c18950d210f",
"indicator--5aa7b780-8fa0-4a1c-8ac3-46bc950d210f",
"indicator--5aa7b79b-8988-43f5-8ba1-4eec950d210f",
"indicator--5aa7b780-080c-4c8e-87f6-41ce950d210f",
"indicator--5aa7b79b-7d00-4d6e-bd1d-4353950d210f",
"indicator--5aa7b780-952c-4366-9231-467e950d210f",
"indicator--5aa7b79b-84c8-4099-aec9-45b7950d210f",
"indicator--5aa7b780-22b0-4ff4-beb3-4f30950d210f",
"indicator--5aa7b79b-7390-4528-9bdc-4e0f950d210f",
"indicator--5aa7b780-ad78-485a-8820-46bc950d210f",
"indicator--5aa7b79b-6bb8-4cd0-b24b-4b66950d210f",
"indicator--5aa7b780-5078-45c9-a666-4672950d210f",
"indicator--5aa7b79b-6da4-4bfa-85c4-47c2950d210f",
"indicator--5aa7b780-cfec-4887-932c-447e950d210f",
"indicator--5aa7b79b-76fc-44e4-a6f4-4052950d210f",
"indicator--5aa7b780-6d74-480a-a496-492c950d210f",
"indicator--5aa7b79b-6ccc-4c94-919e-49e6950d210f",
"indicator--5aa7b780-f774-49e9-b165-4e6f950d210f",
"indicator--5aa7b79b-72a0-4dfc-88bc-4fd3950d210f",
"indicator--5aa7b780-6fe0-409c-ba96-4719950d210f",
"indicator--5aa7b79b-78d8-47bb-be56-481e950d210f",
"indicator--5aa7b780-d910-4f1d-8241-4f15950d210f",
"indicator--5aa7b79b-91d0-442d-af94-40f5950d210f",
"indicator--5aa7b780-31d8-4548-84ec-415a950d210f",
"indicator--5aa7b79b-b2fc-4fd9-8f8a-43c6950d210f",
"indicator--5aa7b780-8910-4e36-9527-4fe5950d210f",
"indicator--5aa7b79b-bd80-4625-ac3a-47db950d210f",
"indicator--5aa7b780-fa10-4537-b97a-4d19950d210f",
"indicator--5aa7b79b-a66c-4e4e-b6e2-4b51950d210f",
"indicator--5aa7b780-6e94-4130-b608-4474950d210f",
"indicator--5aa7b79b-aab0-4e40-8494-445b950d210f",
"indicator--5aa7b780-eb4c-4c8f-9d0c-4547950d210f",
"indicator--5aa7b780-7038-4899-808e-4008950d210f",
"indicator--5aa7b79b-9fb8-4b54-94a1-414e950d210f",
"indicator--5aa7b780-f0d8-4c49-844e-4273950d210f",
"indicator--5aa7b79b-9a9c-41d8-9d8b-44e5950d210f",
"indicator--5aa7b780-70b0-485d-b589-48fa950d210f",
"indicator--5aa7b79b-825c-4686-8366-48af950d210f",
"indicator--5aa7b780-e214-4fcb-87bf-442d950d210f",
"indicator--5aa7b79b-53d8-4be7-8afd-4df9950d210f",
"indicator--5aa7b780-74ac-4fe3-b925-4979950d210f",
"indicator--5aa7b79b-4430-4d09-919f-4c37950d210f",
"indicator--5aa7b780-ffd8-4ecb-bdff-4ddb950d210f",
"indicator--5aa7b79b-3d20-4140-86ef-4aaf950d210f",
"indicator--5aa7b780-8208-4759-9baa-4f91950d210f",
"indicator--5aa7b79b-51cc-46b3-8987-474f950d210f",
"indicator--5aa7b780-0690-41b6-90d1-47d2950d210f",
"indicator--5aa7b79b-573c-4df3-b865-42a2950d210f",
"indicator--5aa7b780-9cac-4c93-b505-4c66950d210f",
"indicator--5aa7b79b-728c-45ce-9cde-4ed3950d210f",
"indicator--5aa7b780-faec-42c8-b51e-426b950d210f",
"indicator--5aa7b79b-6028-4d1c-9e2c-49e6950d210f",
"indicator--5aa7b780-673c-42a3-b31d-4541950d210f",
"indicator--5aa7b79b-4b6c-4e0d-b8ae-4fab950d210f",
"indicator--5aa7b780-dc24-4a89-8c24-4b88950d210f",
"indicator--5aa7b79b-238c-4753-99c1-4ecc950d210f",
"indicator--5aa7b780-49a0-419f-88e9-4eb4950d210f",
"indicator--5aa7b79b-1aec-4465-b9b4-4412950d210f",
"indicator--5aa7b780-c84c-4988-8aab-439b950d210f",
"indicator--5aa7b79b-f9b0-47e6-aa48-409a950d210f",
"indicator--5aa7b780-3d98-4daa-a1e9-4297950d210f",
"indicator--5aa7b79b-02a4-4467-be1c-4ff3950d210f",
"indicator--5aa7b780-c734-482c-88c9-469c950d210f",
"indicator--5aa7b79b-204c-4200-838e-40d7950d210f",
"indicator--5aa7b780-489c-411c-912f-4e63950d210f",
"indicator--5aa7b79b-5758-442a-af2c-440a950d210f",
"indicator--5aa7b780-cf7c-4e50-a6df-4688950d210f",
"indicator--5aa7b79b-79b0-48d3-8f92-48a5950d210f",
"indicator--5aa7b780-60e8-44f3-abb2-4e06950d210f",
"indicator--5aa7b79b-ca20-43e3-9634-44a7950d210f",
"indicator--5aa7b79b-dff8-40ae-bcea-488f950d210f",
"indicator--5aa7b780-e764-4326-ac50-4544950d210f",
"indicator--5aa7b79b-f56c-42ed-ab91-4166950d210f",
"indicator--5aa7b780-69f8-4902-8c3d-42cc950d210f",
"indicator--5aa7b79b-eec0-4ecd-85c5-4c18950d210f",
"indicator--5aa7b79b-ee54-480f-b4ee-4eea950d210f",
"indicator--5aa7b780-0140-42b4-aa48-420e950d210f",
"indicator--5aa7b780-7d30-4578-b4f5-445b950d210f",
"indicator--5aa7b79b-d100-4708-94d8-47f7950d210f",
"indicator--5aa7b780-0e9c-49ff-9e87-4841950d210f",
"indicator--5aa7b79b-f290-432f-a28f-4739950d210f",
"indicator--5aa7b79b-ce34-43be-9797-4be4950d210f",
"indicator--5aa7b780-92c0-45c3-970f-4ec7950d210f",
"indicator--5aa7b79b-d14c-4b30-a425-4485950d210f",
"indicator--5aa7b780-210c-4346-af3d-43c7950d210f",
"indicator--5aa7b79b-b6b4-4313-a8fe-46ad950d210f",
"indicator--5aa7b780-9a40-4328-b313-4a3a950d210f",
"indicator--5aa7b79b-b134-4c2e-bfc0-414b950d210f",
"indicator--5aa7b780-030c-4963-ab37-4403950d210f",
"indicator--5aa7b79b-a3e4-4a88-aba7-47f5950d210f",
"indicator--5aa7b780-9284-40b5-83d7-4ea4950d210f",
"indicator--5aa7b79b-b37c-4b47-ad63-4ccd950d210f",
"indicator--5aa7b780-17d4-4df1-8712-4d23950d210f",
"indicator--5aa7b79b-b374-4eba-85bd-41fc950d210f",
"indicator--5aa7b780-94f0-40c6-b3ce-466b950d210f",
"indicator--5aa7b79b-ba10-41a1-844d-43aa950d210f",
"indicator--5aa7b780-f4c0-4e15-8274-481c950d210f",
"indicator--5aa7b79b-c2a0-4fb1-852b-4bca950d210f",
"indicator--5aa7b780-7d30-4bcc-94d7-4b26950d210f",
"indicator--5aa7b79b-d238-4d2c-b00e-4c3b950d210f",
"indicator--5aa7b780-f088-4075-b41e-4ad5950d210f",
"indicator--5aa7b79b-c4e8-4cf9-bb98-450e950d210f",
"indicator--5aa7b780-6e08-4b09-b7ab-4856950d210f",
"indicator--5aa7b79b-c79c-4425-957a-42fa950d210f",
"indicator--5aa7b780-ee44-439a-93a9-4bdb950d210f",
"indicator--5aa7b79b-b1b4-43f7-bdc2-468e950d210f",
"indicator--5aa7b780-73f8-4c57-a0db-4592950d210f",
"indicator--5aa7b79b-a720-4233-a24d-4634950d210f",
"indicator--5aa7b780-efe8-4c5c-95cb-491a950d210f",
"indicator--5aa7b79b-9c28-4617-b260-49e7950d210f",
"indicator--5aa7b780-72e0-4f68-aba0-40ef950d210f",
"indicator--5aa7b79b-a4b8-4c58-b24f-4b35950d210f",
"indicator--5aa7b780-c8ec-46a6-9557-41c6950d210f",
"indicator--5aa7b79b-bbbc-485e-859c-4c07950d210f",
"indicator--5aa7b781-47bc-426b-9431-45a5950d210f",
"indicator--5aa7b79b-ce10-4d56-9124-4474950d210f",
"indicator--5aa7b781-aaac-4774-91e5-49f7950d210f",
"indicator--5aa7b79b-bc10-4163-a86c-4a28950d210f",
"indicator--5aa7b781-21ec-4452-8f14-4802950d210f",
"indicator--5aa7b79b-d3dc-4af4-931e-46fa950d210f",
"indicator--5aa7b781-7e9c-43f5-ba21-4fd6950d210f",
"indicator--5aa7b79b-c5c4-4f79-9fd0-46ec950d210f",
"indicator--5aa7b781-2520-4e5f-8c98-4ff0950d210f",
"indicator--5aa7b79b-e114-423d-9e09-4ecc950d210f",
"indicator--5aa7b781-a750-4238-bd84-4624950d210f",
"indicator--5aa7b79b-f494-49d7-9767-46ee950d210f",
"indicator--5aa7b79b-1ebc-477a-bd20-4352950d210f",
"indicator--5aa7b781-1e90-42ad-a0af-4698950d210f",
"indicator--5aa7b79b-5a78-46f4-a2f3-4618950d210f",
"indicator--5aa7b781-9634-4aa6-a067-45ba950d210f",
"indicator--5aa7b79b-8310-4208-83d5-4bee950d210f",
"indicator--5aa7b781-eab0-4e8c-9659-417a950d210f",
"indicator--5aa7b781-3c70-4d00-8169-4700950d210f",
"indicator--5aa7b79b-7b38-461e-b19f-4377950d210f",
"indicator--5aa7b781-9ab0-4298-a3c6-4c5f950d210f",
"indicator--5aa7b79b-7428-4d6a-a8db-4ba7950d210f",
"indicator--5aa7b781-195c-4b3a-a530-43b6950d210f",
"indicator--5aa7b79b-5800-4c16-a5e5-45f8950d210f",
"indicator--5aa7b781-9e48-47e2-8187-439b950d210f",
"indicator--5aa7b79b-5604-4c95-b99d-45c2950d210f",
"indicator--5aa7b781-2334-4d22-93b3-453f950d210f",
"indicator--5aa7b79b-659c-4c1b-9593-4daa950d210f",
"indicator--5aa7b781-a62c-49f4-be70-490a950d210f",
"indicator--5aa7b79b-7408-45b9-87b2-4a9d950d210f",
"indicator--5aa7b781-3cac-4e03-8ef7-45a7950d210f",
"indicator--5aa7b79b-6c94-4f26-b278-42c2950d210f",
"indicator--5aa7b79b-7650-4d28-b952-437b950d210f",
"indicator--5aa7b781-c454-4635-a14f-4ea5950d210f",
"indicator--5aa7b79b-9970-40c4-8fd1-4fea950d210f",
"indicator--5aa7b781-2f78-4f43-921f-4eda950d210f",
"indicator--5aa7b79b-99cc-4eab-be8a-4231950d210f",
"indicator--5aa7b781-b658-46d1-91c0-468c950d210f",
"indicator--5aa7b79b-aa2c-4a42-bbcc-4474950d210f",
"indicator--5aa7b781-2a14-4a0a-8430-46be950d210f",
"indicator--5aa7b79b-bd48-42f6-8694-49ee950d210f",
"indicator--5aa7b781-a7f8-4ae6-9025-4c6e950d210f",
"indicator--5aa7b79b-b7c8-44be-ad2e-4e7f950d210f",
"indicator--5aa7b781-163c-45fa-8f5e-4959950d210f",
"indicator--5aa7b79b-cae4-4727-87a3-4e01950d210f",
"indicator--5aa7b781-8ac0-4042-ba99-4dd1950d210f",
"indicator--5aa7b79b-cc6c-4b18-bc18-495c950d210f",
"indicator--5aa7b781-fcec-4f8e-a9dc-4628950d210f",
"indicator--5aa7b79b-0f94-4046-bf66-4067950d210f",
"indicator--5aa7b781-7eb8-4ad0-82b6-4206950d210f",
"indicator--5aa7b79b-2828-4c0b-833f-49df950d210f",
"indicator--5aa7b781-0f5c-419d-9291-48d0950d210f",
"indicator--5aa7b79b-5a20-4c72-861a-4c86950d210f",
"indicator--5aa7b781-7b48-4700-aa3b-4789950d210f",
"indicator--5aa7b79b-6f30-4124-a4c2-4db1950d210f",
"indicator--5aa7b781-d668-4d8f-95d2-43cd950d210f",
"indicator--5aa7b79b-9188-4076-b496-48b5950d210f",
"indicator--5aa7b781-3638-46d9-ac3d-42a3950d210f",
"indicator--5aa7b79b-9888-4f43-ada9-438e950d210f",
"indicator--5aa7b781-902c-46aa-937c-45dd950d210f",
"indicator--5aa7b79b-be64-4eba-a055-4873950d210f",
"indicator--5aa7b781-2198-4a4a-89fe-4df7950d210f",
"indicator--5aa7b79b-ccd0-44ef-9bc3-41c8950d210f",
"indicator--5aa7b781-a940-4501-ad81-4905950d210f",
"indicator--5aa7b79b-e820-44b0-8b00-4f6e950d210f",
"indicator--5aa7b781-4b78-49ff-8b34-44e5950d210f",
"indicator--5aa7b79b-ddf0-48c6-9b19-4d36950d210f",
"indicator--5aa7b781-c6a0-4495-9bcd-48d0950d210f",
"indicator--5aa7b781-4d80-41ce-b252-4769950d210f",
"indicator--5aa7b79b-f6e8-4d3c-94a0-494a950d210f",
"indicator--5aa7b781-b138-4f8e-a14e-4f9c950d210f",
"indicator--5aa7b79b-02fc-4218-87b6-44c5950d210f",
"indicator--5aa7b781-1680-433a-9671-49e1950d210f",
"indicator--5aa7b79b-0934-4378-be42-465b950d210f",
"indicator--5aa7b781-6b60-4f37-8cdc-4107950d210f",
"indicator--5aa7b781-d878-41ca-8cf3-4e4d950d210f",
"indicator--5aa7b79b-fe3c-4bdc-8400-4a67950d210f",
"indicator--5aa7b781-2e20-489b-9022-4337950d210f",
"indicator--5aa7b79b-fca4-4fcf-8457-4177950d210f",
"indicator--5aa7b781-9304-4d28-af5d-4da4950d210f",
"indicator--5aa7b79b-0b74-4278-990d-4675950d210f",
"indicator--5aa7b781-f20c-4f67-9d73-4547950d210f",
"indicator--5aa7b79b-17ec-4ab9-8df0-4f01950d210f",
"indicator--5aa7b781-6a14-4cd5-b967-4636950d210f",
"indicator--5aa7b79b-1aa0-4140-9baa-4ec4950d210f",
"indicator--5aa7b781-c91c-4965-95a5-40d3950d210f",
"indicator--5aa7b79b-2204-49b4-ba4b-48a0950d210f",
"indicator--5aa7b781-2310-4dbd-b927-4f26950d210f",
"indicator--5aa7b79b-1edc-4197-81bc-4b9f950d210f",
"indicator--5aa7b781-921c-4ede-9ea0-44aa950d210f",
"indicator--5aa7b79b-2e74-45ca-a9ea-4d93950d210f",
"indicator--5aa7b781-fe08-40d7-a913-4d68950d210f",
"indicator--5aa7b79b-4578-4f9a-b8e3-4d45950d210f",
"indicator--5aa7b781-5f68-4fd3-8501-4454950d210f",
"indicator--5aa7b79b-612c-40d7-9fa7-4b7b950d210f",
"indicator--5aa7b781-cc80-488c-97e9-4c93950d210f",
"indicator--5aa7b79b-8bb8-43b8-acd5-4602950d210f",
"indicator--5aa7b781-1990-4f70-8438-4c27950d210f",
"indicator--5aa7b79b-c580-48b8-8b63-429f950d210f",
"indicator--5aa7b79b-ec88-49e8-8010-4897950d210f",
"indicator--5aa7b781-82c0-4f18-b910-4568950d210f",
"indicator--5aa7b79b-326c-49f4-94c0-4a75950d210f",
"indicator--5aa7b781-e358-411a-b57e-46f0950d210f",
"indicator--5aa7b79b-4a9c-4381-a56e-4bb6950d210f",
"indicator--5aa7b781-46ac-442c-8a4e-4f3a950d210f",
"indicator--5aa7b79b-6844-4ddc-ad5b-4f02950d210f",
"indicator--5aa7b781-9d1c-4c8a-a4b8-4418950d210f",
"indicator--5aa7b79b-9528-45dd-bf1e-472e950d210f",
"indicator--5aa7b781-f7d8-4cc0-8ac1-433f950d210f",
"indicator--5aa7b79b-d7ec-44ea-ab65-432a950d210f",
"indicator--5aa7b781-580c-4c8d-bd84-4ebd950d210f",
"indicator--5aa7b79b-fe2c-4a1f-9e3c-4603950d210f",
"indicator--5aa7b781-bc28-4126-94d3-4846950d210f",
"indicator--5aa7b79b-1dc8-4f28-aa3b-4246950d210f",
"indicator--5aa7b781-2238-44e8-ac14-42dc950d210f",
"indicator--5aa7b79b-58bc-463f-a99a-4aaf950d210f",
"indicator--5aa7b781-8140-4263-87d5-4549950d210f",
"indicator--5aa7b79b-6728-495a-a69a-4966950d210f",
"indicator--5aa7b781-e23c-48ac-9deb-49f8950d210f",
"indicator--5aa7b79b-55f0-4d4c-bc29-49e0950d210f",
"indicator--5aa7b781-533c-4c62-a335-4091950d210f",
"indicator--5aa7b781-ca18-421b-83f7-4b65950d210f",
"indicator--5aa7b79b-4e18-4615-b581-4f4c950d210f",
"indicator--5aa7b781-3ca8-46d5-a73a-42f3950d210f",
"indicator--5aa7b79b-4f3c-44b4-8085-4fda950d210f",
"indicator--5aa7b781-b514-4379-b0f0-494b950d210f",
"indicator--5aa7b79b-6b54-4dcd-8307-4521950d210f",
"indicator--5aa7b781-3938-4d9a-9d01-49a3950d210f",
"indicator--5aa7b79b-60c0-44ee-b5dc-4e03950d210f",
"indicator--5aa7b781-9a98-4d9a-a9a8-44ac950d210f",
"indicator--5aa7b79b-7a80-4976-b70d-4287950d210f",
"indicator--5aa7b781-fdec-419c-b6cb-447f950d210f",
"indicator--5aa7b79b-94a4-4597-b5d6-45c7950d210f",
"indicator--5aa7b781-8e2c-4a1e-98cd-440f950d210f",
"indicator--5aa7b79b-c700-417b-bbb7-4f53950d210f",
"indicator--5aa7b781-1ffc-4818-bafd-45e3950d210f",
"indicator--5aa7b79b-faec-4219-b054-43b4950d210f",
"indicator--5aa7b781-a290-4f3c-b86f-432f950d210f",
"indicator--5aa7b79b-2514-4768-a41c-4ac5950d210f",
"indicator--5aa7b781-3eec-4336-8aee-4bb6950d210f",
"indicator--5aa7b79b-4bb8-40b9-8422-4eba950d210f",
"indicator--5aa7b781-b94c-4d72-b28e-42ba950d210f",
"indicator--5aa7b79b-7004-4df9-8e55-4141950d210f",
"indicator--5aa7b781-3c44-4ab7-bf6a-4136950d210f",
"indicator--5aa7b79b-9770-4418-be49-472e950d210f",
"indicator--5aa7b781-d38c-4302-9c09-4814950d210f",
"indicator--5aa7b79b-ad48-4379-aa2c-48c8950d210f",
"indicator--5aa7b781-5490-477a-b061-4e70950d210f",
"indicator--5aa7b79b-cb54-4326-83ee-4a95950d210f",
"indicator--5aa7b781-cf54-41d8-a768-4a5a950d210f",
"indicator--5aa7b79b-e320-4f7b-a18e-433b950d210f",
"indicator--5aa7b781-5f30-4275-be6f-41e8950d210f",
"indicator--5aa7b79b-17d4-4776-9a15-4ef7950d210f",
"indicator--5aa7b781-df6c-4d72-9d5c-4d1b950d210f",
"indicator--5aa7b79b-2514-46fe-883f-42d1950d210f",
"indicator--5aa7b781-506c-4e78-ad56-46c9950d210f",
"indicator--5aa7b79b-46a4-4411-86da-4f96950d210f",
"indicator--5aa7b781-bd20-41e3-87dd-4409950d210f",
"indicator--5aa7b79b-71f8-434c-8dad-45f9950d210f",
"indicator--5aa7b781-245c-40e0-bcb0-4da9950d210f",
"indicator--5aa7b79b-a710-4bd7-8b33-40c2950d210f",
"indicator--5aa7b781-9ad4-4014-937f-411d950d210f",
"indicator--5aa7b79b-a76c-4198-9d9b-4be8950d210f",
"indicator--5aa7b781-259c-46ca-b3b2-47df950d210f",
"indicator--5aa7b79b-b31c-4c3d-a9e5-42da950d210f",
"indicator--5aa7b781-9188-4cee-acaa-4ef5950d210f",
"indicator--5aa7b79b-c0c0-44fe-ae50-447a950d210f",
"indicator--5aa7b781-e154-4faf-8485-4150950d210f",
"indicator--5aa7b79b-c248-4404-8a08-4f8b950d210f",
"indicator--5aa7b781-3ff8-4272-98f5-4bd7950d210f",
"indicator--5aa7b79b-c240-4e5b-b24d-4a2c950d210f",
"indicator--5aa7b781-b2ec-4c12-8401-427c950d210f",
"indicator--5aa7b79b-d87c-440a-8aa3-40c1950d210f",
"indicator--5aa7b781-1dac-4883-ab4f-48b5950d210f",
"indicator--5aa7b79b-ddec-405a-82b8-413c950d210f",
"indicator--5aa7b781-81c8-4af9-a246-435c950d210f",
"indicator--5aa7b79b-e3c0-4660-a13c-410a950d210f",
"indicator--5aa7b781-f64c-4172-8fa1-41cf950d210f",
"indicator--5aa7b79b-e354-4432-91c2-453d950d210f",
"indicator--5aa7b781-85c4-4ec3-b9b3-4268950d210f",
"indicator--5aa7b79b-eea0-470e-bf7c-4324950d210f",
"indicator--5aa7b781-0088-41a4-ae58-408c950d210f",
"indicator--5aa7b79b-2fd4-4a41-9852-46a4950d210f",
"indicator--5aa7b781-8704-4cd6-aea4-4c90950d210f",
"indicator--5aa7b79b-3ea4-4641-9271-4c04950d210f",
"indicator--5aa7b781-1488-4500-9848-4bf4950d210f",
"indicator--5aa7b79b-28bc-4c72-954a-43db950d210f",
"indicator--5aa7b781-a9dc-4062-9cb6-469c950d210f",
"indicator--5aa7b79b-2e2c-4ea9-9e10-4e2e950d210f",
"indicator--5aa7b781-4444-4e5d-8094-4130950d210f",
"indicator--5aa7b79b-1cf4-4c52-b0c1-4f72950d210f",
"indicator--5aa7b781-c228-4e78-866f-44a1950d210f",
"indicator--5aa7b79b-23f4-4a45-8b49-49d7950d210f",
"indicator--5aa7b781-49d0-47fe-b144-4c99950d210f",
"indicator--5aa7b781-c9a8-4b43-b9f8-4242950d210f",
"indicator--5aa7b79b-13e8-41b1-b016-40e7950d210f",
"indicator--5aa7b781-1b04-45ae-b078-4423950d210f",
"indicator--5aa7b79b-1f98-4106-b94d-42e9950d210f",
"indicator--5aa7b781-6f1c-4a0f-960e-4b42950d210f",
"indicator--5aa7b79b-fc68-4d8c-af9b-4186950d210f",
"indicator--5aa7b781-bc2c-4812-9dea-48aa950d210f",
"indicator--5aa7b79b-f364-46e9-8c12-44d3950d210f",
"indicator--5aa7b781-2818-41b8-8bfe-4410950d210f",
"indicator--5aa7b79b-eb8c-438c-ac2c-4b28950d210f",
"indicator--5aa7b781-7dc0-4b8d-a08f-40a0950d210f",
"indicator--5aa7b79b-df68-48ba-819c-4d05950d210f",
"indicator--5aa7b781-bf7c-4517-b1a6-432e950d210f",
"indicator--5aa7b79b-ee38-4e8c-83f0-4cad950d210f",
"indicator--5aa7b781-2974-44dd-b799-45fb950d210f",
"indicator--5aa7b79b-ed68-4a18-8203-4551950d210f",
"indicator--5aa7b781-8818-462d-9ad3-45c7950d210f",
"indicator--5aa7b79b-ffbc-4538-a36e-43ab950d210f",
"indicator--5aa7b781-ed60-42f8-aa71-4288950d210f",
"indicator--5aa7b79b-00e0-440a-855c-4d18950d210f",
"indicator--5aa7b781-3944-4988-8d9f-4209950d210f",
"indicator--5aa7b79b-f5e8-4303-b1d5-4049950d210f",
"indicator--5aa7b781-7c2c-46f7-8a47-4b5d950d210f",
"indicator--5aa7b79b-ea8c-4cec-b6dd-4d89950d210f",
"indicator--5aa7b781-d4f4-40d3-b62b-47d2950d210f",
"indicator--5aa7b79b-fe70-4d3e-b613-4050950d210f",
"indicator--5aa7b781-051c-4716-af5c-43ff950d210f",
"indicator--5aa7b79b-ee64-43e5-91a0-45ff950d210f",
"indicator--5aa7b781-31c0-4df7-9430-495c950d210f",
"indicator--5aa7b79b-eb3c-4cfc-bb29-4c23950d210f",
"indicator--5aa7b781-8894-41f5-b564-4be3950d210f",
"indicator--5aa7b79b-dbf8-4a4f-bddd-45ce950d210f",
"indicator--5aa7b781-c85c-4231-8c05-4d5d950d210f",
"indicator--5aa7b79b-e67c-4861-95e2-4fb8950d210f",
"indicator--5aa7b781-043c-450d-b5ca-4d66950d210f",
"indicator--5aa7b79b-d6d4-42e3-9f04-42f1950d210f",
"indicator--5aa7b781-55fc-4b8e-b609-4358950d210f",
"indicator--5aa7b79b-e220-4eb4-96ff-48e7950d210f",
"indicator--5aa7b79b-fd70-4d44-88a9-426e950d210f",
"indicator--5aa7b781-904c-4569-9898-4dee950d210f",
"indicator--5aa7b79b-15a0-4f39-be14-4f4c950d210f",
"indicator--5aa7b781-d014-40cd-b016-4b8c950d210f",
"indicator--5aa7b79b-2e98-4afa-a81c-479a950d210f",
"indicator--5aa7b781-16e4-421d-b264-439e950d210f",
"indicator--5aa7b79b-2f58-4cba-bd99-4690950d210f",
"indicator--5aa7b781-4518-4ecc-bf3e-44f2950d210f",
"indicator--5aa7b79b-4d64-4925-a452-48d5950d210f",
"indicator--5aa7b781-81c0-47fd-8d85-4f96950d210f",
"indicator--5aa7b79b-746c-4db6-a80d-421b950d210f",
"indicator--5aa7b781-ca20-4ace-99f7-481d950d210f",
"indicator--5aa7b79b-8530-48a0-9bcf-4e56950d210f",
"indicator--5aa7b781-2090-46ad-a8f0-481d950d210f",
"indicator--5aa7b79b-b660-40d8-b0a6-4788950d210f",
"indicator--5aa7b781-9000-4f9d-9988-4d67950d210f",
"indicator--5aa7b79b-b0e0-4196-bbbe-4802950d210f",
"indicator--5aa7b781-0e48-48ad-ae44-491f950d210f",
"indicator--5aa7b79b-b90c-4f22-b63c-47a5950d210f",
"indicator--5aa7b781-82cc-48d8-b438-4b9f950d210f",
"indicator--5aa7b79b-c840-42f0-af39-4bfd950d210f",
"indicator--5aa7b781-cfdc-4937-b85f-42e9950d210f",
"indicator--5aa7b79b-c518-4443-9b2c-4c58950d210f",
"indicator--5aa7b781-4a3c-4bdd-a59c-4d22950d210f",
"indicator--5aa7b79b-c31c-4112-8706-4268950d210f",
"indicator--5aa7b781-c050-4226-b9a9-4d7b950d210f",
"indicator--5aa7b79b-d69c-4549-8ea5-4dbf950d210f",
"indicator--5aa7b781-3344-44e1-8ef4-44cb950d210f",
"indicator--5aa7b79b-df2c-4433-8dcf-44f5950d210f",
"indicator--5aa7b781-aae8-484e-8409-465f950d210f",
"indicator--5aa7b79b-f504-4598-85ae-44a1950d210f",
"indicator--5aa7b781-1f6c-4088-b6fe-47e0950d210f",
"indicator--5aa7b79b-f2a4-4ada-9575-4fde950d210f",
"indicator--5aa7b781-9a30-4810-9646-4a29950d210f",
"indicator--5aa7b79b-1f88-4a5b-b41b-41af950d210f",
"indicator--5aa7b781-0810-4bbd-9b9c-4ed6950d210f",
"indicator--5aa7b79b-3a10-4d9a-9871-4d87950d210f",
"indicator--5aa7b781-8464-4b26-9ecc-4360950d210f",
"indicator--5aa7b79b-62a8-4a56-a180-4e0f950d210f",
"indicator--5aa7b79b-817c-453e-affc-4226950d210f",
"indicator--5aa7b781-1c10-4478-8a07-4a67950d210f",
"indicator--5aa7b781-b7a4-4745-ae07-4eb2950d210f",
"indicator--5aa7b79b-8f84-40f3-85bb-452b950d210f",
"indicator--5aa7b79b-b114-4b2a-97af-40c9950d210f",
"indicator--5aa7b781-52d4-4302-a3c8-4299950d210f",
"indicator--5aa7b79b-bb34-4c9b-81fd-4a22950d210f",
"indicator--5aa7b79b-cdec-417a-b3f7-4fb7950d210f",
"indicator--5aa7b781-e058-4269-b215-4b0e950d210f",
"indicator--5aa7b781-6670-42b5-a763-442d950d210f",
"indicator--5aa7b79b-be44-462c-9caf-4afe950d210f",
"indicator--5aa7b79b-9ca4-4a41-916c-4740950d210f",
"indicator--5aa7b781-01a0-4aed-87a5-4e91950d210f",
"indicator--5aa7b79b-852c-437e-92fa-4c8c950d210f",
"indicator--5aa7b781-5cc0-4fac-bace-4c6e950d210f",
"indicator--5aa7b79b-5c84-416a-834f-4ffe950d210f",
"indicator--5aa7b781-c974-4a46-b6bb-4663950d210f",
"indicator--5aa7b79b-68fc-4fbb-8345-4563950d210f",
"indicator--5aa7b781-4a78-4d49-8ecb-46f7950d210f",
"indicator--5aa7b79b-731c-44db-b62d-41b8950d210f",
"indicator--5aa7b781-f228-4204-be34-4bb6950d210f",
"indicator--5aa7b79b-6c70-402c-ad96-470a950d210f",
"indicator--5aa7b781-7714-483d-bc9a-4208950d210f",
"indicator--5aa7b79b-6a74-426f-8476-408d950d210f",
"indicator--5aa7b781-fd90-4fce-825e-4e74950d210f",
"indicator--5aa7b79b-76ec-494f-b9eb-4a73950d210f",
"indicator--5aa7b781-9474-4905-b4a6-4541950d210f",
"indicator--5aa7b79b-522c-4e04-8849-4594950d210f",
"indicator--5aa7b781-2e78-4e45-994f-43b9950d210f",
"indicator--5aa7b79b-3988-41fe-846b-42e8950d210f",
"indicator--5aa7b781-b364-437d-900a-4a65950d210f",
"indicator--5aa7b79b-1400-414f-a7a6-444a950d210f",
"indicator--5aa7b781-4d04-43c6-b1da-48a5950d210f",
"indicator--5aa7b79b-064c-41d2-89b4-446b950d210f",
"indicator--5aa7b781-0bc0-4e4a-a9a8-45ff950d210f",
"indicator--5aa7b79b-d69c-452c-a43e-4b44950d210f",
"indicator--5aa7b781-8eb8-406a-baaa-4588950d210f",
"indicator--5aa7b79b-b9ac-4f2e-a0f7-4e48950d210f",
"indicator--5aa7b781-0404-4a4a-a6c5-42c6950d210f",
"indicator--5aa7b79b-ba6c-47f8-ae02-437c950d210f",
"indicator--5aa7b781-7b44-4a03-a873-4897950d210f",
"indicator--5aa7b79b-bb2c-4681-b7b3-4b96950d210f",
"indicator--5aa7b79b-9c48-4ec0-8b50-401b950d210f",
"indicator--5aa7b781-2358-42c0-8587-4976950d210f",
"indicator--5aa7b79b-6d60-4c08-a0e7-4527950d210f",
"indicator--5aa7b781-964c-4419-9f76-43a5950d210f",
"indicator--5aa7b79b-39c8-4dc7-b31e-416e950d210f",
"indicator--5aa7b781-1cc8-435f-9f2b-43cd950d210f",
"indicator--5aa7b79b-19b8-4820-b2c4-4ab4950d210f",
"indicator--5aa7b781-9728-4c8b-bd10-4b13950d210f",
"indicator--5aa7b781-1c14-45ef-8699-4aa2950d210f",
"indicator--5aa7b79b-f430-4714-a593-4bb6950d210f",
"indicator--5aa7b781-aa60-4547-a889-4250950d210f",
"indicator--5aa7b79b-c28c-4ef6-a819-4926950d210f",
"indicator--5aa7b781-4338-47b2-8fa3-459c950d210f",
"indicator--5aa7b79b-a8bc-4511-882f-4c7f950d210f",
"indicator--5aa7b79b-81a4-4b5d-8883-4b2d950d210f",
"indicator--5aa7b781-ce64-40cc-93ce-435e950d210f",
"indicator--5aa7b79b-53e8-4efa-9872-494f950d210f",
"indicator--5aa7b781-0850-42eb-ad14-4c8c950d210f",
"indicator--5aa7b79b-1948-4988-a86b-4684950d210f",
"indicator--5aa7b781-a4ac-4b62-896a-46ee950d210f",
"indicator--5aa7b79b-2110-4782-b3ce-4cee950d210f",
"indicator--5aa7b781-286c-49ae-a577-489b950d210f",
"indicator--5aa7b79b-1f78-411b-93f5-4b8b950d210f",
"indicator--5aa7b781-e340-4c52-b9bc-4f06950d210f",
"indicator--5aa7b79b-1e44-426f-9cea-43a0950d210f",
"indicator--5aa7b781-a3f0-4814-8997-4ea4950d210f",
"indicator--5aa7b79b-fab0-4ed5-b934-42b8950d210f",
"indicator--5aa7b781-6888-483f-a659-4880950d210f",
"indicator--5aa7b79b-f080-4bef-aada-40c5950d210f",
"indicator--5aa7b781-0548-41ef-93f1-4970950d210f",
"indicator--5aa7b79b-d9d0-42c3-bd8a-410b950d210f",
"indicator--5aa7b781-7a94-4981-8fed-4a39950d210f",
"indicator--5aa7b79b-d0cc-4dbb-9899-4128950d210f",
"indicator--5aa7b781-1e5c-4466-85bf-4d1c950d210f",
"indicator--5aa7b79b-c570-43dd-bdbb-47ea950d210f",
"indicator--5aa7b781-b0f4-4f9a-b002-4655950d210f",
"indicator--5aa7b79b-b2a8-4180-9561-455d950d210f",
"indicator--5aa7b781-17cc-447d-9e56-47fc950d210f",
"indicator--5aa7b79b-867c-48f3-a474-49fc950d210f",
"indicator--5aa7b781-92f4-47b0-8c94-4a80950d210f",
"indicator--5aa7b79b-8098-467c-bcef-405a950d210f",
"indicator--5aa7b781-fa94-4368-af2b-45df950d210f",
"indicator--5aa7b79b-5534-4e2a-8560-4d28950d210f",
"indicator--5aa7b781-7df0-40e1-bb47-4eaa950d210f",
"indicator--5aa7b79b-5ef0-435d-9379-44ff950d210f",
"indicator--5aa7b781-ee8c-4ae9-a3e7-46b4950d210f",
"indicator--5aa7b79b-5b64-471e-8ab8-4377950d210f",
"indicator--5aa7b781-7184-421b-be01-4f88950d210f",
"indicator--5aa7b79b-3b54-4e94-8419-4b5f950d210f",
"indicator--5aa7b781-c8bc-4b5c-a69d-4e91950d210f",
"indicator--5aa7b79b-1568-487d-aa1d-4ec3950d210f",
"indicator--5aa7b781-2378-469e-80ad-4bc6950d210f",
"indicator--5aa7b79b-f1d4-4ba3-b6bc-4748950d210f",
"indicator--5aa7b781-b548-4c17-b90a-4049950d210f",
"indicator--5aa7b79b-d5ac-4e85-bc17-416a950d210f",
"indicator--5aa7b781-1068-4cc8-b1ce-487e950d210f",
"indicator--5aa7b79b-d158-46f3-a676-426d950d210f",
"indicator--5aa7b781-8de8-4262-954d-4703950d210f",
"indicator--5aa7b79b-5388-4fef-8bad-49ac950d210f",
"indicator--5aa7b781-0910-454b-a346-4442950d210f",
"indicator--5aa7b79b-b038-4852-a2de-440d950d210f",
"indicator--5aa7b781-8dfc-4185-98db-4ebe950d210f",
"indicator--5aa7b79b-0ce8-4399-96a0-429d950d210f",
"indicator--5aa7b781-0f64-4647-bca5-469e950d210f",
"indicator--5aa7b79b-5d18-4692-88cb-4cb9950d210f",
"indicator--5aa7b781-6f98-4720-8ac9-486b950d210f",
"indicator--5aa7b79b-e45c-4ddf-9220-445a950d210f",
"indicator--5aa7b781-f038-48af-9493-4b1e950d210f",
"indicator--5aa7b79b-63d0-4b46-bfb9-40a9950d210f",
"indicator--5aa7b781-470c-48f7-98d0-4c32950d210f",
"indicator--5aa7b79b-e024-453c-bb8a-4ed7950d210f",
"indicator--5aa7b781-c5b8-450f-a716-4b74950d210f",
"indicator--5aa7b79b-5c14-43a5-b57c-4964950d210f",
"indicator--5aa7b781-277c-44fc-885f-4116950d210f",
"indicator--5aa7b79b-a7f8-4645-baf5-46e8950d210f",
"indicator--5aa7b781-829c-4cea-9070-45a3950d210f",
"indicator--5aa7b79b-1894-4353-aa45-4998950d210f",
"indicator--5aa7b781-e780-4a6c-91bf-4224950d210f",
"indicator--5aa7b79b-6284-4954-837f-491d950d210f",
"indicator--5aa7b781-4f84-4438-aa81-4789950d210f",
"indicator--5aa7b79b-9a18-4e39-ae00-4bb9950d210f",
"indicator--5aa7b781-efc8-4de8-aa73-448c950d210f",
"indicator--5aa7b79b-6298-46fb-a6f9-4ca9950d210f",
"indicator--5aa7b781-6ce4-47de-8c6b-4aab950d210f",
"indicator--5aa7b79b-ba98-460a-bede-4551950d210f",
"indicator--5aa7b79b-2bfc-4f5d-abda-4533950d210f",
"indicator--5aa7b79b-b408-4e7b-ad48-4e0c950d210f",
"indicator--5aa7b79b-2bac-4f53-b060-4fc6950d210f",
"indicator--5aa7b79b-ba5c-47c4-bd14-4df8950d210f",
"indicator--5aa7b79b-2c88-4909-bd88-43b7950d210f",
"indicator--5aa7b79b-91d0-4b33-a459-4555950d210f",
"indicator--5aa7b79b-f330-4937-a015-4f3a950d210f",
"indicator--5aa7b79b-6368-4d1a-aac4-4acf950d210f",
"indicator--5aa7b79b-ec3c-486c-9b23-4aac950d210f",
"indicator--5aa7b79b-411c-430b-b382-460a950d210f",
"indicator--5aa7b79b-ad08-4d70-9f1e-44d3950d210f",
"indicator--5aa7b79b-1f34-4b0d-8ed9-4766950d210f",
"indicator--5aa7b79b-8350-4fe3-bb0d-4c85950d210f",
"indicator--5aa7b79b-df9c-4258-9de8-4ea1950d210f",
"indicator--5aa7b79b-4868-4df0-ba3a-4cc7950d210f",
"indicator--5aa7b79b-d524-4b5f-92da-4467950d210f",
"indicator--5aa7b79b-4a0c-46d5-991b-4fb5950d210f",
"indicator--5aa7b79b-aef0-479b-bd38-423e950d210f",
"indicator--5aa7b79b-1d98-4e3c-8003-431f950d210f",
"indicator--5aa7b79b-8664-4fee-8ba9-4adf950d210f",
"indicator--5aa7b79b-e24c-4a2f-955c-46c0950d210f",
"indicator--5aa7b79b-5cac-4ce6-9bc6-402b950d210f",
"indicator--5aa7b79b-cc1c-48da-a6ba-4bf1950d210f",
"indicator--5aa7b79b-2b88-42d4-a029-4a6a950d210f",
"indicator--5aa7b79b-a138-4036-8592-477e950d210f",
"indicator--5aa7b79b-efd8-4b32-9106-425d950d210f",
"indicator--5aa7b79b-30cc-4d95-a17e-4d10950d210f",
"indicator--5aa7b79b-e0b0-418b-915c-405a950d210f",
"indicator--5aa7b79b-52dc-45a9-8662-47d0950d210f",
"indicator--5aa7b79b-ad34-4f77-9c05-4a96950d210f",
"indicator--5aa7b79b-1538-4451-834a-4164950d210f",
"indicator--5aa7b79b-8b4c-42c1-99dd-4cf7950d210f",
"indicator--5aa7b79b-efcc-45d1-87d1-4883950d210f",
"indicator--5aa7b79b-4574-41a2-b843-493f950d210f",
"indicator--5aa7b79b-97fc-4e40-8802-4b4e950d210f",
"indicator--5aa7b79b-da80-4112-bdaf-496b950d210f",
"indicator--5aa7b79b-272c-4d6a-99ed-4fa8950d210f",
"indicator--5aa7b79b-7f90-4c7b-ac55-4b56950d210f",
"indicator--5aa7b79b-e348-4d6d-819b-4e56950d210f",
"indicator--5aa7b79b-4c78-4855-86bd-4dfe950d210f",
"indicator--5aa7b79b-ad74-4c3a-8f1e-495e950d210f",
"indicator--5aa7b79b-e3dc-4071-8f58-4a73950d210f",
"indicator--5aa7b79b-3858-422d-bd6e-415c950d210f",
"indicator--5aa7b79b-b574-4a53-9f44-4dcb950d210f",
"indicator--5aa7b79b-fe9c-46cd-a8c3-4444950d210f",
"indicator--5aa7b79b-6ce0-4f63-8066-498d950d210f",
"indicator--5aa7b79b-e09c-4f0e-8084-4c9e950d210f",
"indicator--5aa7b79b-13e4-4fe4-88bd-4650950d210f",
"indicator--5aa7b79b-5348-460a-af1f-4f42950d210f",
"indicator--5aa7b79b-b0c0-44ab-b4b1-4502950d210f",
"indicator--5aa7b79b-06cc-43d0-a2fa-4174950d210f",
"indicator--5aa7b79b-5ecc-4193-bee1-4c48950d210f",
"indicator--5aa7b79b-c090-4e22-814c-4038950d210f",
"indicator--5aa7b79b-1638-4aae-bf8b-4995950d210f",
"indicator--5aa7b79b-6794-4382-a1aa-41ca950d210f",
"indicator--5aa7b79b-c37c-4227-a755-4ed8950d210f",
"indicator--5aa7b79b-1ab4-4bbf-9f9d-40c0950d210f",
"indicator--5aa7b79b-8448-4dcc-b6e1-4476950d210f",
"indicator--5aa7b79b-e030-42a2-878a-4bcb950d210f",
"indicator--5aa7b79b-51f8-44d2-bbb2-4d11950d210f",
"indicator--5aa7b79b-bcb8-4ec9-a197-4b54950d210f",
"indicator--5aa7b79b-42d0-4a24-b025-49d1950d210f",
"indicator--5aa7b79b-b0b0-4af0-994a-4264950d210f",
"indicator--5aa7b79b-165c-4e80-aba2-4af2950d210f",
"indicator--5aa7b79b-48dc-4952-9ae3-4e9c950d210f",
"indicator--5aa7b79b-83f4-4bee-90ba-4b51950d210f",
"indicator--5aa7b79b-c998-4445-b7bf-489a950d210f",
"indicator--5aa7b79b-0ed8-4fe1-b724-477d950d210f",
"indicator--5aa7b79b-41bc-45ac-ad23-4786950d210f",
"indicator--5aa7b79b-60b4-4833-b7b8-42e7950d210f",
"indicator--5aa7b79b-a658-408c-a179-4f17950d210f",
"indicator--5aa7b79b-0628-449a-8771-49be950d210f",
"indicator--5aa7b79b-6ef4-4d20-bbe6-47ed950d210f",
"indicator--5aa7b79b-f890-4dd1-a950-4ac9950d210f",
"indicator--5aa7b79b-6738-415f-b93e-43f7950d210f",
"indicator--5aa7b79b-d194-4485-94a5-4d9e950d210f",
"indicator--5aa7b79b-1738-43a3-8a37-406d950d210f",
"indicator--5aa7b79b-6574-4389-8986-4eb2950d210f",
"indicator--5aa7b79b-b2e8-450a-a5e2-4ba9950d210f",
"indicator--5aa7b79b-df8c-499d-8245-4088950d210f",
"indicator--5aa7b79b-14c8-4a3d-8025-4556950d210f",
"indicator--5aa7b79b-493c-4e1a-aa90-451e950d210f",
"indicator--5aa7b79b-7838-485c-87b1-49d3950d210f",
"indicator--5aa7b79b-ab80-4bd4-ab08-404a950d210f",
"indicator--5aa7b79b-dff4-4c58-b363-4075950d210f",
"indicator--5aa7b79b-1c38-4286-9e94-42d9950d210f",
"indicator--5aa7b79b-843c-490e-98e8-4cec950d210f",
"indicator--5aa7b79b-c4cc-4e5f-809f-499e950d210f",
"indicator--5aa7b79b-33d8-4567-bfd6-4cc6950d210f",
"indicator--5aa7b79b-bcac-4964-9e64-46b6950d210f",
"indicator--5aa7b79b-5714-45db-8816-4c79950d210f",
"indicator--5aa7b79b-f244-45da-8e9c-49b7950d210f",
"indicator--5aa7b79b-4aa8-4b56-ba2c-418c950d210f",
"indicator--5aa7b79b-bd9c-4337-953c-4d1a950d210f",
"indicator--5aa7b79b-28c0-4cd3-b965-48f5950d210f",
"indicator--5aa7b79b-9bb4-44d8-8312-45a9950d210f",
"indicator--5aa7b79b-028c-417d-8c10-4a52950d210f",
"indicator--5aa7b79b-6770-44bc-8fc1-468d950d210f",
"indicator--5aa7b79b-e5b8-4721-acfa-4236950d210f",
"indicator--5aa7b79b-5140-4f76-9d6e-4bd8950d210f",
"indicator--5aa7b79b-b5c0-46d4-bd31-4949950d210f",
"indicator--5aa7b79b-3408-4298-a6f2-4099950d210f",
"indicator--5aa7b79b-9824-416c-a62f-494b950d210f",
"indicator--5aa7b79b-06cc-4724-96d9-4b09950d210f",
"indicator--5aa7b79b-6ed0-4a99-bfd7-4bac950d210f",
"indicator--5aa7b79b-b668-4574-bfdb-4bc2950d210f",
"indicator--5aa7b79b-0760-40ea-a39b-476e950d210f",
"indicator--5aa7b79b-608c-460a-933e-4f1b950d210f",
"indicator--5aa7b79b-a824-436a-91f2-482c950d210f",
"indicator--5aa7b79b-1410-447b-bfdb-4579950d210f",
"indicator--5aa7b79b-63dc-4021-81a1-4cce950d210f",
"indicator--5aa7b79b-9c38-4f2c-87e8-4b60950d210f",
"indicator--5aa7b79b-c6e8-47e3-a82b-4569950d210f",
"indicator--5aa7b79b-1a38-4c26-bbf6-4107950d210f",
"indicator--5aa7b79b-7044-4cba-ad57-496f950d210f",
"indicator--5aa7b79b-c77c-48a5-a390-460a950d210f",
"indicator--5aa7b79b-18d8-47a6-9fee-460f950d210f",
"indicator--5aa7b79b-78a8-4dd2-a8e3-44ed950d210f",
"indicator--5aa7b79b-bbf4-4e9c-b783-42c8950d210f",
"indicator--5aa7b79b-ded4-4ac4-8bbe-4896950d210f",
"indicator--5aa7b79b-f46c-4225-9f90-499d950d210f",
"indicator--5aa7b79b-4dfc-4178-80d2-4dc5950d210f",
"indicator--5aa7b79b-c21c-443a-bea8-4ffb950d210f",
"indicator--5aa7b79b-0c70-4a24-a705-4adb950d210f",
"indicator--5aa7b79b-5980-40ff-985e-4644950d210f",
"indicator--5aa7b79b-ae60-4521-b27b-4650950d210f",
"indicator--5aa7b79b-ccf4-413d-9a54-43b0950d210f",
"indicator--5aa7b79b-2df0-4dda-9ec7-45a8950d210f",
"indicator--5aa7b79b-920c-4f49-8be9-4ef1950d210f",
"indicator--5aa7b79b-fa74-4f3f-891d-4ba5950d210f",
"indicator--5aa7b79b-7ab0-45e3-9001-4124950d210f",
"indicator--5aa7b79b-d184-4d27-b0d5-4352950d210f",
"indicator--5aa7b79b-30f0-4e47-9dca-4468950d210f",
"indicator--5aa7b79b-82b0-4157-9b6a-419b950d210f",
"indicator--5aa7b79b-b33c-4490-9d3f-49f7950d210f",
"indicator--5aa7b79b-0f88-449d-9046-4556950d210f",
"indicator--5aa7b79b-6850-4f09-9814-4c19950d210f",
"indicator--5aa7b79b-c8e8-4c3f-8d37-4404950d210f",
"indicator--5aa7b79b-1788-4cba-b5b6-48a7950d210f",
"indicator--5aa7b79b-52a0-42f5-a575-4342950d210f",
"indicator--5aa7b79b-a1a4-4061-b6c1-4001950d210f",
"indicator--5aa7b79b-0c00-4fd0-9d78-481d950d210f",
"indicator--5aa7b79b-526c-42e9-9a30-43cb950d210f",
"indicator--5aa7b79b-c3d0-4241-99d9-40e3950d210f",
"indicator--5aa7b79b-1978-462e-89be-4991950d210f",
"indicator--5aa7b79b-75c4-43fc-b6dc-4312950d210f",
"indicator--5aa7b79b-c978-45ea-b917-4c8b950d210f",
"indicator--5aa7b79b-0cc4-4f58-a571-4b66950d210f",
"indicator--5aa7b79b-5330-433a-809d-4cbd950d210f",
"indicator--5aa7b79b-7f0c-4046-b2af-43b9950d210f",
"indicator--5aa7b79b-9ff8-496e-8c4e-4cee950d210f",
"indicator--5aa7b79b-0478-44a9-b00e-48a7950d210f",
"indicator--5aa7b79b-7190-4de0-b7db-4a3f950d210f",
"indicator--5aa7b79b-9ca4-48d9-8af5-4b26950d210f",
"indicator--5aa7b79c-0c9c-451d-8b8c-4ca5950d210f",
"indicator--5aa7b79c-3e54-4cbb-bd9b-42b3950d210f",
"indicator--5aa7b79c-95f0-456c-b801-400c950d210f",
"indicator--5aa7b79c-deb4-4836-941e-465f950d210f",
"indicator--5aa7b79c-5dc4-42c4-93fc-416f950d210f",
"indicator--5aa7b79c-c62c-485a-83be-4943950d210f",
"indicator--5aa7b79c-3790-44d2-8484-4057950d210f",
"indicator--5aa7b79c-6df8-4055-88ad-45ee950d210f",
"indicator--5aa7b8c0-2458-41f1-a93d-452a950d210f",
"indicator--5aa7b8c0-6200-46b8-9fed-4685950d210f",
"indicator--5aa7b8c0-80cc-4aec-89a3-48ff950d210f",
"indicator--5aa7b8c0-7694-4386-807a-4751950d210f",
"indicator--5aa7b8c0-98a4-4465-8d20-4d23950d210f",
"indicator--5aa7b8c0-48a4-4eb1-b189-4630950d210f",
"indicator--5aa7b8c0-e4b8-4d8a-b177-47da950d210f",
"indicator--5aa7b8c0-0f84-4900-9e64-4f43950d210f",
"indicator--5aa7b8c0-5054-4c77-9282-46d7950d210f",
"indicator--5aa7b8c0-e520-48c3-8533-4949950d210f",
"indicator--5aa7b8c0-43e0-4fda-989d-4e05950d210f",
"indicator--5aa7b8c0-e0bc-4e77-8ac2-452e950d210f",
"indicator--5aa7b8c0-cce4-4ca9-bb12-40cf950d210f",
"indicator--5aa7b8c0-8e14-474d-aa40-4409950d210f",
"indicator--5aa7b8c0-42c4-4936-9679-47b2950d210f",
"indicator--5aa7b8c0-2e88-47be-a987-4764950d210f",
"indicator--5aa7b8c0-1b14-4f77-bf18-4880950d210f",
"indicator--5aa7b8c0-ce34-4b37-ac9f-4c65950d210f",
"indicator--5aa7b8c0-6e94-41a8-8d09-477c950d210f",
"indicator--5aa7b8c0-c908-47bd-97ce-44b5950d210f",
"indicator--5aa7b8c0-7990-4354-869d-4b48950d210f",
"indicator--5aa7b8c0-4e90-4969-908f-43f6950d210f",
"indicator--5aa7b8c0-637c-44b8-b741-422a950d210f",
"indicator--5aa7b8c0-e860-40e5-b4b4-4980950d210f",
"indicator--5aa7b8c0-71f4-470b-b0cf-43d1950d210f",
"indicator--5aa7b8c0-3f80-4eda-8b44-4f4c950d210f",
"indicator--5aa7b8c0-c870-4ff8-8d3f-4efe950d210f",
"indicator--5aa7b8c0-e400-4b2b-9a3a-47b3950d210f",
"indicator--5aa7b8c0-ce18-4cca-9953-4d99950d210f",
"indicator--5aa7b8c0-7478-4269-aca3-4ed0950d210f",
"indicator--5aa7b8c0-1410-4870-942d-4441950d210f",
"indicator--5aa7b8c0-b218-4b2f-993f-4aca950d210f",
"indicator--5aa7b8c0-32d4-478a-95c8-4e75950d210f",
"indicator--5aa7b8c0-d208-4096-bbf2-4e8e950d210f",
"indicator--5aa7b8c0-3064-4b26-8370-4f60950d210f",
"indicator--5aa7b8c0-7818-4202-aac3-431c950d210f",
"indicator--5aa7b8c0-b734-4958-8d65-491f950d210f",
"indicator--5aa7b8c0-a978-4c59-b92c-40fb950d210f",
"indicator--5aa7b8c0-d078-4459-854b-4076950d210f",
"indicator--5aa7b8c0-fdb8-4c15-9f62-46d8950d210f",
"indicator--5aa7b8c0-2fa8-4d0a-8faf-4bac950d210f",
"indicator--5aa7b8c0-2d00-433d-8912-4f16950d210f",
"indicator--5aa7b8c0-8e7c-4055-9ac3-4ccc950d210f",
"indicator--5aa7b8c0-e3dc-4ca1-8e7b-4997950d210f",
"indicator--5aa7b8c0-e774-4704-8be7-4e92950d210f",
"indicator--5aa7b8c0-ec38-4b24-8f42-4d1b950d210f",
"indicator--5aa7b8c0-f160-49b2-94df-48b9950d210f",
"indicator--5aa7b8c0-0e5c-4eee-8616-49da950d210f",
"indicator--5aa7b8c0-e4a4-4d3e-aa89-44d7950d210f",
"indicator--5aa7b8c0-b128-4200-b1f2-4343950d210f",
"indicator--5aa7b8c0-8770-42d0-92e7-4b1b950d210f",
"indicator--5aa7b8c0-519c-4368-b51e-4ef4950d210f",
"indicator--5aa7b8c0-2334-43c7-b708-4c42950d210f",
"indicator--5aa7b8c0-e144-4952-85cf-463c950d210f",
"indicator--5aa7b8c0-86b8-41bb-859b-4866950d210f",
"indicator--5aa7b8c0-33fc-4662-af5a-43b8950d210f",
"indicator--5aa7b8c0-1728-4bea-b816-4296950d210f",
"indicator--5aa7b8c0-bb70-4553-854c-436a950d210f",
"indicator--5aa7b8c0-6530-45b2-acaa-4e20950d210f",
"indicator--5aa7b8c0-c2c4-486a-b144-4969950d210f",
"indicator--5aa7b8c0-2120-4bf5-a3d3-478d950d210f",
"indicator--5aa7b8c0-7874-48f0-94d2-44d8950d210f",
"indicator--5aa7b8c0-d540-4665-a892-45ac950d210f",
"indicator--5aa7b8c0-3e28-4a55-aa7a-4b81950d210f",
"indicator--5aa7b8c0-9edc-48da-911e-4b09950d210f",
"indicator--5aa7b8c0-d498-4c0e-a6c5-4182950d210f",
"indicator--5aa7b8c0-70ac-43cb-91e6-4b53950d210f",
"indicator--5aa7b8c0-3114-46b3-a294-4523950d210f",
"indicator--5aa7b8c0-e880-4668-8db6-4fb5950d210f",
"indicator--5aa7b8c0-9fec-44da-a37a-44b7950d210f",
"indicator--5aa7b8c0-62ac-4ae7-8293-4fd2950d210f",
"indicator--5aa7b8c0-2ecc-4e0b-bd4c-4f06950d210f",
"indicator--5aa7b8c0-0af0-417d-8069-4f8c950d210f",
"indicator--5aa7b8c0-071c-4698-b7b3-4aa0950d210f",
"indicator--5aa7b8c0-09ec-4ff5-a4ec-42b2950d210f",
"indicator--5aa7b8c0-7ef0-433e-8c5f-4e86950d210f",
"indicator--5aa7b8c0-af98-4b7a-a04c-4d93950d210f",
"indicator--5aa7b8c0-0cc8-4119-b63f-4e32950d210f",
"indicator--5aa7b8c0-5be8-4b69-91e1-4eb9950d210f",
"indicator--5aa7b8c0-0030-4b96-8a3e-4945950d210f",
"indicator--5aa7b8c0-aa54-433e-aac3-400a950d210f",
"indicator--5aa7b8c0-87a4-42e8-9761-4f52950d210f",
"indicator--5aa7b8c0-3998-46cc-8648-4d2c950d210f",
"indicator--5aa7b8c0-2818-4606-a33e-4c4e950d210f",
"indicator--5aa7b8c0-f9b0-4687-9d6f-476e950d210f",
"indicator--5aa7b8c0-b1e4-4516-b653-41f2950d210f",
"indicator--5aa7b8c0-7da0-496f-8ace-4652950d210f",
"indicator--5aa7b8c0-4254-4b6b-8e2a-453c950d210f",
"indicator--5aa7b8c0-0960-4762-b74a-420f950d210f",
"indicator--5aa7b8c0-3d68-44bf-9060-4bf1950d210f",
"indicator--5aa7b8c0-69e0-40a4-8ad2-47c0950d210f",
"indicator--5aa7b8c0-8eec-40f9-af5e-4943950d210f",
"indicator--5aa7b8c0-abc4-47f7-b16f-4e5a950d210f",
"indicator--5aa7b8c0-0c54-4075-9825-42ef950d210f",
"indicator--5aa7b8c0-d234-44ab-992e-41d6950d210f",
"indicator--5aa7b8c0-84f0-40db-a0ae-459b950d210f",
"indicator--5aa7b8c0-4bfc-4666-97b4-4712950d210f",
"indicator--5aa7b8c0-1ec0-4f6b-94a5-4176950d210f",
"indicator--5aa7b8c0-d884-4d4f-9af0-407e950d210f",
"indicator--5aa7b8c0-51d4-4c45-a4fa-4371950d210f",
"indicator--5aa7b8c0-d998-468d-b58c-4691950d210f",
"indicator--5aa7b8c0-5a54-4415-b5bf-481d950d210f",
"indicator--5aa7b8c0-eca4-4f85-a3e5-4858950d210f",
"indicator--5aa7b8c0-86c4-46bd-b10c-404f950d210f",
"indicator--5aa7b8c0-1c34-43b6-aba1-4775950d210f",
"indicator--5aa7b8c0-a650-4f75-b83d-427d950d210f",
"indicator--5aa7b8c0-5e20-4ffc-97fd-42dc950d210f",
"indicator--5aa7b8c0-1b68-4c3d-ae45-416e950d210f",
"indicator--5aa7b8c0-f4d0-4667-a502-4784950d210f",
"indicator--5aa7b8c0-b27c-4d7d-a2b5-4e19950d210f",
"indicator--5aa7b8c0-4e90-49be-8189-49c7950d210f",
"indicator--5aa7b8c0-0e94-4c99-bbc1-49bb950d210f",
"indicator--5aa7b8c0-b980-4c71-b90d-455e950d210f",
"indicator--5aa7b8c0-759c-4e38-9275-4754950d210f",
"indicator--5aa7b8c0-4284-4bdb-8a6e-46c1950d210f",
"indicator--5aa7b8c0-06d4-45b0-a1a9-444f950d210f",
"indicator--5aa7b8c0-ec58-45dc-b7b5-4a96950d210f",
"indicator--5aa7b8c0-bfe4-42ff-a1e3-4104950d210f",
"indicator--5aa7b8c0-8560-498d-9a1f-4ebd950d210f",
"indicator--5aa7b8c0-3b3c-4b36-897a-4bfc950d210f",
"indicator--5aa7b8c0-f17c-4809-99d7-4377950d210f",
"indicator--5aa7b8c0-2ff4-4df6-aa5e-4a3c950d210f",
"indicator--5aa7b8c0-78f8-4581-a89e-49d1950d210f",
"indicator--5aa7b8c0-9aec-4349-8674-4bcd950d210f",
"indicator--5aa7b8c0-d068-4eaa-83eb-4eea950d210f",
"indicator--5aa7b8c0-2bc8-4071-bdf1-4ddf950d210f",
"indicator--5aa7b8c0-c1c0-40ed-b42e-46b3950d210f",
"indicator--5aa7b8c0-ef6c-4d59-98ba-4383950d210f",
"indicator--5aa7b8c0-ca88-4b78-a814-43b5950d210f",
"indicator--5aa7b8c0-4b04-49c7-a187-4c81950d210f",
"indicator--5aa7b8c0-8210-4397-98d3-422c950d210f",
"indicator--5aa7b8c0-eb1c-4100-8ff9-485b950d210f",
"indicator--5aa7b8c0-4b90-4f1d-8cdb-46b4950d210f",
"indicator--5aa7b8c0-5934-4478-8ea3-4092950d210f",
"indicator--5aa7b8c0-bb9c-4b4e-9eb6-4078950d210f",
"indicator--5aa7b8c0-70d4-440a-af73-42fb950d210f",
"indicator--5aa7b8c0-9458-406f-bcfa-4ff6950d210f",
"indicator--5aa7b8c0-4c4c-4c59-9909-48ef950d210f",
"indicator--5aa7b8c0-26a0-484b-b5a5-43d7950d210f",
"indicator--5aa7b8c0-76ec-4a28-ad8b-4831950d210f",
"indicator--5aa7b8c0-e038-472d-86b5-461d950d210f",
"indicator--5aa7b8c0-a18c-4b84-be31-4648950d210f",
"indicator--5aa7b8c0-fbe4-4b1a-a7cd-4637950d210f",
"indicator--5aa7b8c0-5da8-4911-b74f-42dd950d210f",
"indicator--5aa7b8c0-33f0-4f56-93cd-4d96950d210f",
"indicator--5aa7b8c0-e580-4990-b1f7-48a3950d210f",
"indicator--5aa7b8c0-f060-4e3a-a928-4bb4950d210f",
"indicator--5aa7b8c0-5194-4f43-b9bf-44cf950d210f",
"indicator--5aa7b8c0-650c-4a8a-9304-4490950d210f",
"indicator--5aa7b8c0-5d90-4c2f-8124-4f37950d210f",
"indicator--5aa7b8c0-74f0-4cce-9fa0-4710950d210f",
"indicator--5aa7b8c0-97a4-4bad-b3ad-4c60950d210f",
"indicator--5aa7b8c0-84d4-4b97-822d-4d0b950d210f",
"indicator--5aa7b8c0-a6c0-4bbd-a5cf-4c97950d210f",
"indicator--5aa7b8c0-9f44-43a6-a0dc-494c950d210f",
"indicator--5aa7b8c0-969c-4842-bc10-4e5f950d210f",
"indicator--5aa7b8c0-981c-4cd2-ad6b-4270950d210f",
"indicator--5aa7b8c0-d96c-41eb-8915-456d950d210f",
"indicator--5aa7b8c0-6ce8-454b-b54f-4e36950d210f",
"indicator--5aa7b8c0-f704-406f-84d8-4fa4950d210f",
"indicator--5aa7b8c0-950c-4f35-ad48-4943950d210f",
"indicator--3ebecaa7-b9a3-48a4-becf-194625b24f9d",
"x-misp-object--be09f3b1-9fcf-4d5b-848e-41fecd41123d",
"indicator--b5694caa-9b22-415f-8272-9c57b3eb08c3",
"x-misp-object--2b4622e3-ecfd-4e33-88d1-4be6fee2d27e",
"indicator--04a11bb7-a841-49e4-b957-a50ff66a07ef",
"x-misp-object--da8cc514-e9c2-43ba-8713-65bd1ee4cc93",
"indicator--010c6b65-7d24-4eb1-b9f3-161e4bf63908",
"x-misp-object--3027a1fa-cc56-4b97-9c23-f87a15628a5c",
"indicator--2ea254d8-6356-40c2-962f-e9a22e94b9a2",
"x-misp-object--a0e300ab-5db9-439a-a31d-078a28483155",
"indicator--7aa4af10-cefa-4496-aa7c-aecaa6ba6915",
"x-misp-object--168731b1-b9f6-49e3-8396-e43356f48865",
"indicator--c3854528-0d86-43d7-9af1-c892adaa2014",
"x-misp-object--e3120171-4e17-469d-87cd-1c3b2214b193",
"indicator--32755cdb-a46a-4796-a3dc-8cdac5895b13",
"x-misp-object--c8f2386e-a26d-4911-8a45-e5f037add7f3",
"indicator--83b23c1f-380c-4c9b-8ff1-d88a0d77e200",
"x-misp-object--38764b5c-c154-4392-a0c3-7574c19b999c",
"indicator--91f03806-38a6-41c7-bf7b-59cde7114d4c",
"x-misp-object--06833811-1d61-4866-b351-c35e84d53f29",
"indicator--1862b97f-3ec9-4764-af14-cb1a39e2e1e2",
"x-misp-object--0e9a8a1d-4d35-4624-8a79-456fb80187e4",
"indicator--333502f7-2faf-4732-9cf8-0b57085db280",
"x-misp-object--a0cd4885-4c2a-4471-a8a5-03700ab2cf77",
"indicator--3df64f90-91fe-4af4-b4fe-8fd371df1e2b",
"x-misp-object--05943cc4-e0ee-4d46-b752-673fd1f9347d",
"indicator--73813f31-8277-4a96-abec-99d11d5855d7",
"x-misp-object--a9d050ef-1ff4-4906-a484-cf8f3f7cad84",
"indicator--7a9ebf88-5d69-41e7-a572-971cb751e615",
"x-misp-object--98f9a90f-6b1c-45b3-a027-9837ecbb6875",
"indicator--694ccc7c-c1e3-459c-be5e-8bbb60cf776d",
"x-misp-object--16b262fe-fc38-4a41-aae1-f7c79a3f2b27",
"indicator--7fbaea4b-0ef0-409d-80eb-82e5dfba5994",
"x-misp-object--eb32ed3c-79fb-4635-9706-c65725f4925c",
"indicator--2bf82666-d839-4cb4-9d62-47afcbabb8d8",
"x-misp-object--72530e57-9793-49b0-a161-0078753a7e2a",
"indicator--5061f21a-a424-479d-b119-eb03ca72474a",
"x-misp-object--9bf45a52-e2d6-4363-85cd-9f1762674618",
"indicator--d3f36e32-07db-4834-8c85-432352352e55",
"x-misp-object--e89df188-9ef2-4fb1-af1e-7d8990320d01",
"indicator--b6089b1d-ce2c-482b-acbd-4940ddf9b43d",
"x-misp-object--776e3fae-22a7-473d-8c9e-448f7cebe70c",
"indicator--943bbe65-be8f-4fcd-a963-8f40bee18ea7",
"x-misp-object--327db92f-c41f-47c6-9791-7cde1d9ce511",
"indicator--8a6de377-1b81-4988-9132-ed8d9ecf36ff",
"x-misp-object--3ea6b034-235f-44ae-984c-8e5d8e2b3499",
"indicator--39755ccf-9fff-4b16-b894-a4742fe0b548",
"x-misp-object--84cb6f05-0dd6-4fd0-869b-5051282359e6",
"indicator--f2989d98-57c2-4e75-b139-d98f1debcd6e",
"x-misp-object--91ba1536-8bd4-4a09-a11f-590dd2f76adb",
"indicator--4846a202-a825-4439-a27b-2e9855f3e75b",
"x-misp-object--fac91df2-91df-4947-8855-c63df8ea4719",
"indicator--e01012ad-efbd-43a2-ae1e-925c8c88bdfb",
"x-misp-object--875c39a6-aefb-4cab-8dd1-76de2098bc65",
"indicator--170a0ade-9dbd-46a0-88c8-9b9c31f603df",
"x-misp-object--ee355cf8-ecb9-43f6-8af7-149019418b7d",
"indicator--acaf2fa6-6f3c-4b06-a5f9-3bb31b191409",
"x-misp-object--1eb655cb-6991-4136-9a71-5d07c824734e",
"indicator--57b549c9-a6f5-4fbe-93de-835d64e5d801",
"x-misp-object--1c17f990-5b27-40d9-a80b-e2ff9a10c38f",
"indicator--83846430-c5cf-403f-821c-665b6d7d24ae",
"x-misp-object--bac69422-8149-4b9b-b191-268f042035aa",
"indicator--f7e44f2c-acce-4a13-bb4f-7a8a3f561f6a",
"x-misp-object--1bdd2424-ec61-48b5-b0fc-cfe234973c69",
"indicator--860df4c8-2d41-4fc7-b3fc-abea9a79399a",
"x-misp-object--cd3742e9-9515-451b-9d86-0900994ffe1e",
"indicator--f2bf99ab-22ca-42a8-ade9-dd3259513e1d",
"x-misp-object--f7a2f44d-913b-412f-8a87-29015a121194",
"indicator--3cdbd820-ccfe-4805-a87f-66639a605863",
"x-misp-object--d295ca83-4c3b-44e9-bf94-8ea103e0ca84",
"indicator--5282a1ef-c68b-441b-b128-7b98762c7db5",
"x-misp-object--52b803c3-0c4c-414f-ab7f-61c009b4c3f9",
"indicator--ffee8c30-fe29-4c86-9b73-30c567bf8611",
"x-misp-object--6d666a98-8722-41c6-951c-010645d867ea",
"indicator--8e10aae3-e3c3-4fb9-8871-64897fb41a12",
"x-misp-object--51bf0041-0608-40d2-a4b8-dac196a75558",
"indicator--2a95ad9c-9614-4175-9c77-307846c62223",
"x-misp-object--1c9db02b-c9a4-4f2d-8e66-4d1116798eb4",
"indicator--e709461d-0ae6-468d-87eb-63960bd22851",
"x-misp-object--30dce96c-9cdd-40ea-8945-b106b9b4a3b2",
"indicator--21ebf0fd-7772-45af-b54c-abc5df09ea6f",
"x-misp-object--90930896-570d-4f08-9767-9299e3e25f8c",
"indicator--db0cef85-c247-4270-a64b-cfc6208435b7",
"x-misp-object--617a92ab-8635-4f5e-80c9-a714809d0592",
"indicator--73918517-e510-4af0-a019-bf2bee56493f",
"x-misp-object--49ea5f6c-b55f-42f9-aa76-b9d21ef849da",
"indicator--aef2b037-4ed7-4588-8cde-a018c637147c",
"x-misp-object--a3c0c9b1-aa83-4af5-be53-f932ccf256bb",
"indicator--62d5dec4-9817-4b1a-bb14-609a1b6758a5",
"x-misp-object--629868f3-c236-41a5-a066-de88f0bc5754",
"indicator--5453664b-9768-452f-80d9-b9a02391183d",
"x-misp-object--588bfd9d-f8dc-46b6-8229-c99a0a18fa93",
"indicator--76e97e10-38c3-41c9-a84d-5614621238d5",
"x-misp-object--281801c2-274e-4e56-9cce-7547583867fd",
"indicator--993c1778-6454-40b9-bf98-e2c2993d751c",
"x-misp-object--99fd2972-6ddc-4f44-86bf-cf3cdee3d8dd",
"indicator--629083e5-c228-4a5f-ab26-905d65f29816",
"x-misp-object--30fc814c-16cf-402d-8af4-b1b42f1f0670",
"indicator--973eccaa-c84b-4e8a-acdc-20fb1cced3d0",
"x-misp-object--3bc155aa-8c8a-4ad9-a170-238d59cd6423",
"indicator--9669a60a-a564-40cc-90f3-6a0619ddf84b",
"x-misp-object--7472369f-9901-4c09-bfb1-244c7d70e65e",
"indicator--f9456adf-90ba-400d-ba2a-f34cd7f929d0",
"x-misp-object--c51d359b-36fa-4a3f-8c24-f31adb564a9a",
"indicator--eb54ed4e-6811-4c83-8aee-c334fee7214c",
"x-misp-object--4966f0ba-fea3-4837-b833-8f9a5d41d38e",
"indicator--5f4d9667-75ad-4a32-9e13-ad54428acb2b",
"x-misp-object--a91d690d-70d7-4949-bfb0-6067f001a596",
"indicator--9041116a-b6b5-4d5c-a565-d6178035272b",
"x-misp-object--848f6b87-3abc-4578-a29d-3d36b95393df",
"indicator--9f28f790-484f-41c7-98fd-19c53a5784ad",
"x-misp-object--ccefa011-af8a-4a21-ae83-32e24a2bcf5d",
"indicator--20a1faef-5b03-4328-a877-a6d9ecce874d",
"x-misp-object--d3df38dc-94a4-490a-a393-30f28bb71c2a",
"indicator--62f011a5-158a-4e17-9274-373a8afa7f89",
"x-misp-object--fd076d81-b315-4442-825d-b43dd7931e58",
"indicator--2910e51e-9648-4e47-afdf-a4e987e19b36",
"x-misp-object--de7ed8dc-8696-458b-bb57-f9f9108072ec",
"indicator--d1784ba3-1ef0-4d79-8079-c9dc92251090",
"x-misp-object--122ea312-54ee-42c9-9246-5a1b4c5d6e9d",
"indicator--f30501a4-1ca7-4609-957b-15efbfab4c35",
"x-misp-object--d9686b2d-97a4-4279-908e-a465007070a0",
"indicator--6f94cdef-c5a9-409d-9fa3-8a13133ff47f",
"x-misp-object--4012a76c-de18-4390-a286-2c83696b393d",
"indicator--4b6c97d5-3fe1-4419-bf6b-f179e663bcd1",
"x-misp-object--9fa6c908-2ff0-4298-aa58-9fed29b6621c",
"indicator--5f5a9bef-cbc2-4048-a584-02fe6b323301",
"x-misp-object--d4ce528e-6e53-4462-8b4d-bf43bcf7a122",
"indicator--3c44b011-cea0-49e8-b582-fad55d1d8af1",
"x-misp-object--d9f6f916-1093-437b-9010-23a6d7ba2770",
"indicator--262143f5-8e2c-48f0-a7ff-98463168dc27",
"x-misp-object--b1bd6e18-7266-4a67-b549-1177d939703d",
"indicator--4778b0bb-ca98-4bd7-8f8a-5d408f3cff9e",
"x-misp-object--4006abea-7694-4809-ad2f-f5b1d0b8648a",
"indicator--c8f23cd0-337b-4520-b4d3-c7b053601507",
"x-misp-object--17da1ccf-d4c1-4428-8404-8d3659d59793",
"indicator--b01eed1e-c2f3-4a55-ae9e-c38e8d385f0a",
"x-misp-object--b544c25d-094a-4b2b-a6dd-14b6ace52836",
"indicator--7fe8a7d6-0855-42f6-9a14-b2824acfb3b4",
"x-misp-object--42755064-ba05-4f91-b78f-689be27b717e",
"indicator--7515eaf4-b764-46a3-b4bb-a9dd4669c17e",
"x-misp-object--fc459030-58b1-4629-8287-71eb17a46f1f",
"indicator--0c710fd7-5c24-4156-80af-9ce1133f1b34",
"x-misp-object--59ee90d1-bae4-42a5-9686-5f2ad4cb8007",
"indicator--1f4e9c0c-d4b9-4b41-b50e-95a86e12635f",
"x-misp-object--c60414fe-d8a1-485f-b326-ec39137346c4",
"indicator--772a44aa-5648-43da-ae46-a43b0e51dede",
"x-misp-object--8076f407-c7c6-42e5-9901-5ea7dca9e02c",
"indicator--3842366a-678d-443f-83ba-e2523a409506",
"x-misp-object--0c7561b8-109e-4cde-85ee-0c5ceaa66987",
"indicator--6e33ec1b-4c4b-4ff2-9df3-e0ef2cf0d557",
"x-misp-object--68bfceef-61e7-40b2-8baf-9191f74d200c",
"indicator--b41008c1-0bec-4725-b8fa-fb41541dedc0",
"x-misp-object--e7aedbef-df58-4fa7-b32a-34eb2c0ed4e5",
"indicator--a0ff86b1-25e6-4093-8971-dccc063f05a8",
"x-misp-object--724bc7ba-ba88-4e5d-9c40-7676621f8735",
"indicator--1373fe1f-de01-4475-915b-6851db2f39e4",
"x-misp-object--fc7f1e60-0b74-422a-809b-d51ccf402c0e",
"indicator--c45f14db-dfbd-4555-b390-2276e6ff1ad2",
"x-misp-object--fae7c364-8729-429b-9ea9-3b31af0f3ea5",
"indicator--56a2d91c-c23b-4c5e-b2e3-921244e87225",
"x-misp-object--1e6b86c2-a47c-487a-9f37-325383622e1d",
"indicator--6d17c059-317b-40e2-9085-4f8286e2d10e",
"x-misp-object--00d27731-8a04-43ba-944f-d93082b05bce",
"indicator--a5a9364c-78a9-48e7-9960-74cafd72c762",
"x-misp-object--8812bcfd-652a-48f9-8ce0-d0859f8a7d74",
"indicator--cfdebb5e-9bed-4110-91e1-967541c218d5",
"x-misp-object--088a12ae-cb7c-4e19-bf34-de6c31c42421",
"indicator--8cfdb710-e0eb-4aa0-be7f-4bef7c057f48",
"x-misp-object--50d32b71-58f6-49bd-950c-8201f8c8f6a0",
"indicator--0ee0151f-da7d-4d9f-8d67-74dc297b1ac7",
"x-misp-object--afef20ad-8f41-41fd-ab24-c13d4bb81db2",
"indicator--66c51f09-728f-4bbc-a2f0-8fd2dd9ee34c",
"x-misp-object--94c29569-4c2f-4eca-83ea-71b34b2f04ac",
"indicator--8ba4601c-07fc-4c31-b409-70f55daec9da",
"x-misp-object--e0e6c464-9727-4e62-99a8-d2d896ef3be0",
"indicator--c7f95bca-d452-4ca5-b2fd-81284eefa29a",
"x-misp-object--95bd6a8c-2c13-44dc-a176-04b903e55468",
"indicator--895e6d73-cc04-4d7d-a74f-1c79d68cc85d",
"x-misp-object--ba96f218-b01d-4fb3-986e-4a4b129d501a",
"indicator--a18a3d72-f1c0-40f0-9281-25c93d8002c7",
"x-misp-object--d673e058-bd6f-4588-b64a-5f26648b833f",
"indicator--1a981d65-59bc-4a14-81a1-008f4c77159a",
"x-misp-object--ad7412ca-ba99-4dc1-9098-1b14d7898562",
"indicator--f6601087-35c3-4239-85b2-25f4a4c9c1f0",
"x-misp-object--f1915336-fa1d-4500-931f-5368fbc727d4",
"indicator--abf60cec-d36a-4744-b7a1-a33e5763a9c4",
"x-misp-object--32ea0688-10d4-4123-b4c6-d68fb5cc55d4",
"indicator--a8aecb74-f7d5-4f56-9dc7-3c00ba2f4b0d",
"x-misp-object--f355561d-a7fa-4896-be8c-1f8274815354",
"indicator--a9d8f073-dd7a-4e9b-a0a7-04598ce32926",
"x-misp-object--10380065-18d9-4ca8-8cb4-dad38fdd929d",
"indicator--7638c728-3089-4a20-af0a-b37900bc1f1d",
"x-misp-object--86f66db8-becb-45ae-b0f3-e3340cd5d19a",
"indicator--7f886d78-e6f7-4ecd-8828-e9693e314aa0",
"x-misp-object--0f3c8eab-f129-49da-9ed7-cc8b7f1b09f0",
"indicator--51f66ea4-bd23-495b-be2c-64962e187550",
"x-misp-object--ff35fc80-aed9-44b8-bf9a-04ae04bb9b29",
"indicator--93cdfd6c-153f-458f-8b4d-6d3eea4d85fa",
"x-misp-object--25d08574-096e-4a9b-b9cc-e292aff3160a",
"indicator--d2244ec7-b833-45ee-b46d-46d0eb8821a6",
"x-misp-object--0dd974d2-228a-4efd-9c80-5c3ebec6afe2",
"indicator--a252e7e6-4210-4a0e-af70-808685490bf0",
"x-misp-object--3fda77bd-6a6a-4fdb-a784-0569bd5b8bc4",
"indicator--652791f2-58a3-4bc2-9127-eee90e5777fc",
"x-misp-object--245b7bed-15e3-4235-86bd-27e0d9bc6c46",
"indicator--bd4872e3-93f3-4a82-85ab-0fef4dc1a473",
"x-misp-object--47225078-5904-4fc7-96ae-03e630f628e7",
"indicator--7724b584-9fbf-4690-8824-571ca40e8647",
"x-misp-object--a9700a79-b809-4626-9a0f-1b5e30547578",
"indicator--eccc55d5-a165-4f16-8dba-993df6d0c16d",
"x-misp-object--c14e1628-941c-43c0-81ef-0b8bf8e8db3e",
"indicator--da83d80a-c5b2-4f00-b78f-bd6cea6c47be",
"x-misp-object--e7be8927-c465-4b2e-bfcc-68a41eae297a",
"indicator--de30c258-e3ff-4103-90f0-66b263006c0b",
"x-misp-object--c9f224ab-0c81-4deb-9160-85f96bc624c2",
"indicator--e4f6dfdc-fb92-4812-8c6d-91b7548ebadf",
"x-misp-object--f83784d1-6a08-4009-a46e-4aed15ff5dee",
"indicator--5a0cdfe2-1650-41fa-ac1f-99afa14cc188",
"x-misp-object--b3785c90-1c5f-4739-8cf1-31e946583359",
"indicator--da10673d-4b03-473f-943b-e68b51a49372",
"x-misp-object--c0f2a053-934c-4be9-ad1d-7249dfef9301",
"indicator--cb0ffcf7-6e1a-4bc5-b72e-b1c50a4c072a",
"x-misp-object--c0d442d4-72b6-47cb-b4b8-18744a4fd84d",
"indicator--4272cdd1-73f2-4b9a-a8b5-64d3a1d7dfd0",
"x-misp-object--857ca1d6-7992-4e86-9a8a-9baf9005bbd9",
"indicator--2f2d7190-59a8-4a22-b2af-ac312b91bfe0",
"x-misp-object--df56eb90-6fe6-4dc2-86c7-0c1134d65812",
"indicator--2701b8c8-6625-4f06-a88f-c78f56165a61",
"x-misp-object--9f4f8732-0f86-487d-b2f5-1d2d89aef0bd",
"indicator--93b95f15-4cb7-419f-841c-450ac3d2fcf6",
"x-misp-object--048e1c5f-6a94-4dd9-bbf7-eda1802b6d9c",
"indicator--be1441ae-b2e5-41ed-abdd-414809f6352f",
"x-misp-object--3741aec9-519d-4649-ad8a-549d2450e256",
"indicator--f231a6ea-f8b4-43f8-adac-96e31854da2c",
"x-misp-object--e5f7cc1c-cd7e-49f5-9d23-96945164180e",
"indicator--f9a65653-53de-44fd-a416-29aeb4cf5f1e",
"x-misp-object--19789499-f9e3-4415-afb9-7dee60e37880",
"indicator--091a7f76-14d6-48df-86fc-76bf406a81a9",
"x-misp-object--fc99724e-fb1c-49c1-a876-021d95449e91",
"indicator--edc558da-e5d9-484e-a89c-2d4286e33de7",
"x-misp-object--a567af95-f7a3-4bf2-baa3-270f681e5322",
"indicator--ad876176-ecb0-4443-a1e3-3474fea95c7c",
"x-misp-object--4c0aa304-4439-4634-ab20-fa7a819e4cfb",
"indicator--27853edd-8b95-4a9c-8fd5-256adb3e5da6",
"x-misp-object--4a39f8b7-6642-4a32-aa2c-511de3de0ae6",
"indicator--63998fb4-3796-4b69-bbb5-c786f85c6e24",
"x-misp-object--77335a35-58f3-4736-8e65-9d43eadd3255",
"indicator--f501ee7d-5468-4059-a745-dc1f392e6a44",
"x-misp-object--8482a386-b5b8-479a-974a-219fe749b1ab",
"indicator--ebfa55c6-2e68-4f35-a2f3-060799e22095",
"x-misp-object--a3bb6a50-5123-498e-8f1a-6923b54b0b35",
"indicator--2316025b-81d4-4611-8420-62597b2163f7",
"x-misp-object--436f3cd9-f66e-4d35-b0c3-ba8c39c5a0c4",
"indicator--dc57f819-a4ca-4824-ba9d-e6d0e9f78b9d",
"x-misp-object--37f56d93-b168-44cb-90c9-e245c6eee85a",
"indicator--4f1fd255-9d15-43ec-a8b6-5fdf0abbd1c5",
"x-misp-object--18efd0c2-3813-4e9f-bf69-330dea779353",
"indicator--8f789d00-5c20-45f6-8091-834ea7f79fcd",
"x-misp-object--74d6bbc6-5b6e-485e-b40f-e0076046c307",
"indicator--318e9442-266a-42df-9bcb-57af40dc6fee",
"x-misp-object--9f4cb389-a3be-4918-8887-595689e68ba0",
"indicator--6212c88a-a171-457e-bce5-e495cb75bcd6",
"x-misp-object--8d1e8e66-f43c-4d3f-8b88-326769b2dadd",
"indicator--b564d217-c2db-44d8-b069-916f0fee7fc7",
"x-misp-object--2693cbb3-ac2c-476e-a4bf-b199c7e88878",
"indicator--3bc0a925-001a-4ec0-b662-c6ffdfa883da",
"x-misp-object--9c4a8abf-36e5-45f2-9950-acb6fc6d6d8d",
"indicator--de573c2e-d1b7-4454-830b-ee0de6ffebe7",
"x-misp-object--2b361753-16d6-4b91-aa83-2241be1c2111",
"indicator--f845f0d3-8a14-4cd0-ac52-b68a45ad6bd1",
"x-misp-object--22ac03b3-05b2-4cb3-b1cf-06a04d09b191",
"indicator--b7dc6423-6d05-411f-ab96-1f5fe5bff960",
"x-misp-object--99910c76-477b-4cf0-bae3-dd9aabed6f4c",
"indicator--db1db06e-a0ec-4bb8-b529-d8eb867e24c4",
"x-misp-object--5fc6ede9-b781-4eb4-8c6a-a47a025901ef",
"indicator--42066cdc-d515-4c5e-b536-6403bd2fa1b5",
"x-misp-object--869f01f6-7bb3-44b4-bc9e-8b736da289fa",
"indicator--b2a4407f-5430-4c80-bf8f-507f234cdf38",
"x-misp-object--081ea566-bd34-49d7-be26-ccbb3ad585d1",
"indicator--4baac2f7-b640-49ea-aa37-60ae3a4b7e66",
"x-misp-object--93f77b86-ed4f-4313-8c22-6010b7795a8d",
"indicator--7baf9480-e568-41e6-a1f1-fff7d516fbb1",
"x-misp-object--b8d85b22-76dc-4882-85ac-0fb0f74b754f",
"indicator--70733fd0-6c28-4129-980c-8ff97d139d43",
"x-misp-object--808e6a5f-a93e-48f1-8678-d5f32b61f516",
"indicator--86a9886d-1f0c-48e5-978c-8f96df99efed",
"x-misp-object--980fe535-bfc5-45db-979a-1c6e45bfa4b4",
"indicator--991239b6-a59d-4891-9365-3297334f53b8",
"x-misp-object--e5931a6d-c9d6-4c85-9184-45c54d0896e5",
"indicator--af070041-9ff6-4592-b8f9-c8321cb360ab",
"x-misp-object--3b6371b2-89d5-4271-ada4-05f54fd4ceb7",
"indicator--e518371a-6ff1-4160-86db-52fd485c75ed",
"x-misp-object--16b70a36-22ec-44de-9284-c8513068cae6",
"indicator--774d6ed8-303c-4a84-935d-f3ac619f4e8f",
"x-misp-object--dc1da038-6340-42d1-ba26-176fe9bcded0",
"indicator--f6f9fee4-876e-4765-ac1f-923a8e449811",
"x-misp-object--6c106bd5-9842-4461-b8dd-0faa223d2c68",
"indicator--ef7ab321-e2e2-45d6-a76b-ed61d6ccbdba",
"x-misp-object--fccef241-584e-4a8c-bcac-44550ac946a0",
"indicator--972390dc-b051-4c4f-952a-2daca6c94e2a",
"x-misp-object--6d2857f8-cde7-49a7-86f7-27711cde2de0",
"indicator--6c18de88-4e54-4aca-8333-7b6002fc6581",
"x-misp-object--3fe466f9-e2a4-4cd9-85fe-b5985c458e79",
"indicator--c0777536-9c34-4420-ad25-8a811bf2948c",
"x-misp-object--eeac1674-b2c3-403a-af56-098d62b62f9d",
"indicator--ad0bbb06-2204-4a91-a97c-85d1f2c8bedc",
"x-misp-object--c511bbf9-ee03-472f-9275-86e54f87e603",
"indicator--181cb412-06ff-42e2-9e5c-f3b5a7f11780",
"x-misp-object--d09085d8-c050-4efa-8e91-586e9207ef3c",
"indicator--7fadae6d-0f96-456c-8717-ce5168fcd964",
"x-misp-object--5978498f-332b-46d5-ac8b-5da2f33ba5fc",
"indicator--84d40159-8f0c-400c-8d61-34ea3ee11fd5",
"x-misp-object--fa3049b4-4fb2-4010-b3d6-df251f5e601d",
"indicator--97613f9a-68d6-4e2b-92a4-99963309ce91",
"x-misp-object--be1dbba5-f49d-4dc9-b130-19e084d25584",
"indicator--9850420f-b885-45a9-a6e2-af2380c164a7",
"x-misp-object--09920e57-e715-4c54-b158-9a9ee4b11723",
"indicator--e4a8088c-bb92-4cff-9775-8f2369d9c9d7",
"x-misp-object--5850fabb-73d0-4f76-a406-a6f7e27b0b09",
"indicator--e60f450e-6f03-470e-9126-dc098b8138a0",
"x-misp-object--eef7f7bc-bb25-4b04-9930-1d76137be36e",
"indicator--110e5750-cf74-4fe0-9af7-59757472d6e4",
"x-misp-object--c2a69426-1e1e-4522-b6dc-a3833d75a33e",
"indicator--60afce5d-2b5c-4c36-ab17-ab9544a2744e",
"x-misp-object--b80f6804-4169-4522-825b-985b9349fabc",
"indicator--20408dac-7c98-4bcf-bd33-a53de3436da3",
"x-misp-object--9a547937-9c10-4da0-8147-fa1e898ed8bc",
"indicator--b9ebd188-91d8-4229-8b64-13d8daa59f3e",
"x-misp-object--d6008b30-2b4b-4d67-b609-7d7a5604ab1d",
"indicator--682d3605-86dd-4f7e-80f2-a99ad1dd4e70",
"x-misp-object--d94c34c7-d78d-4d62-82e9-911bc6d298bd",
"indicator--1a99a2de-2373-4621-a8fb-3810a2d1e0b3",
"x-misp-object--1d9c8849-48b1-4c5a-86c1-23c30aa5bd85",
"indicator--98b8fd89-339b-4f7a-ab5b-9c386741f7f4",
"x-misp-object--a255438b-ec32-4257-8de6-dc7a054f4126",
"indicator--639a5e0f-c87f-4c39-bb1f-0443c6fe085f",
"x-misp-object--b70cf9ce-61c3-4cc0-84d1-d2848d3e98e8",
"indicator--baf077d1-6aca-4cbc-ba3f-33bda3b9411b",
"x-misp-object--712481dd-995d-491f-b929-5e3322c631ec",
"indicator--13d8d248-26dd-4144-a295-f5359295233d",
"x-misp-object--2a7d70a1-7b62-4ab4-8e52-eb2580366dfa",
"indicator--be3b992c-a86f-4e3d-a44b-1e319fa67c66",
"x-misp-object--34447c7d-838f-4cb6-b8d0-0a9f0a0af702",
"indicator--2bd8f5ed-adf0-45ff-ada9-9bed3a4060ae",
"x-misp-object--ac8f6787-b5f5-4ee6-b1a0-0b303f34ab29",
"indicator--c41a3658-a663-4d02-96a1-31891e0a2b70",
"x-misp-object--0bdb8b75-3f37-4741-b0b9-5c45ed8f0468",
"indicator--d68f2720-4b5e-4632-a07c-161efaa36753",
"x-misp-object--62a200f5-ada3-489e-8be4-0f841b49ccf1",
"indicator--2d4e2c18-2028-4f1e-a670-a518a678dd03",
"x-misp-object--9e3d433c-19c8-471a-a95e-f645423a88c3",
"indicator--1656bc8a-bb59-41ee-b95b-4d8c7709675b",
"x-misp-object--93704ecb-f463-4722-92f8-61dea8ddeb24",
"indicator--cf0a1d5f-2e78-44fb-8ca1-850ba3b02c9b",
"x-misp-object--ee2d4946-ea46-4614-929b-b892f9908209",
"indicator--ee5ee3f3-5de5-420c-a078-ecb7b097731d",
"x-misp-object--db8dfdee-1040-4e3e-9c50-bafef41f9cd8",
"indicator--0b5f6c32-9395-4cbd-a0bf-dd0d0530e2a8",
"x-misp-object--33eda59f-9e49-43f3-958d-a55e2a6f1166",
"indicator--c1fb6054-0e84-4bb2-a205-389fc558673a",
"x-misp-object--40779d2d-1039-423f-a494-825d7952460d",
"indicator--e77be68c-627e-49ae-97d4-e0905966779f",
"x-misp-object--e15aae65-2ce2-4bf1-bf9b-bf0b5f6a4b42",
"indicator--4d96769c-72ab-4627-b0d4-d0340cd5afb8",
"x-misp-object--6a64e291-db27-4ab7-a4f1-d219c2d4a213",
"indicator--03ca8515-5a71-4777-af1a-d1ff1d6e5a8c",
"x-misp-object--0adc6624-4217-4fff-8afc-70515da5eb04",
"indicator--b842ab6c-0657-4c07-b5d6-7d84cddd0db5",
"x-misp-object--41092416-53fd-4ebc-9dd7-c561b27c71d3",
"indicator--501eb9d3-d927-4981-9a70-029446f915cc",
"x-misp-object--f7f485cf-39d2-496d-8559-26ac32cf9a49",
"indicator--471a7dbf-92c0-465f-ba18-05dfb063b09e",
"x-misp-object--df430360-e730-4f9f-bc3e-686429c7583a",
"indicator--f01594da-861d-4f87-b396-47514fa8363b",
"x-misp-object--0b79ea19-b0d7-40b9-8776-a2a016033403",
"indicator--dfa0759a-c600-44e9-9876-9917c0a250b4",
"x-misp-object--5839cd4b-1637-4bb9-bb4f-d47ebed941c9",
"indicator--6b548802-ebdb-43a5-9401-d2f8f3028d08",
"x-misp-object--4d3b0767-ca9c-4a59-b2b6-6b5d45774032",
"indicator--bb56a8a6-e4d3-42d0-833f-e4361b54331a",
"x-misp-object--4d05714f-a5ef-4d4f-a006-8f30c4f980b6",
"indicator--1830e8c1-fd3c-4bf3-a1c8-62552d336b81",
"x-misp-object--8dc0fa9d-8101-4cfa-a7ca-708ad1e8641b",
"indicator--0f99173c-5e8d-4184-9112-90283901d5a7",
"x-misp-object--8f9ecfd9-d95a-4499-b479-443b63588110",
"indicator--34be655c-ccbd-4123-b790-0e89cdaed85d",
"x-misp-object--86b97a0a-ae05-4885-9931-5adfba823b6e",
"indicator--2f9ea31a-b956-4e72-9a09-e16343cfbff6",
"x-misp-object--c298d324-80ca-47b6-839a-8194f675280e",
"indicator--4b8152a1-9434-45eb-b87c-1e63940242d9",
"x-misp-object--3a193c9f-2212-4f1a-a4c5-4ad4c34c83c5",
"indicator--8d352130-43c7-45ed-8071-f107683e85e2",
"x-misp-object--826f69c0-6353-407b-959a-6db753aa04cc",
"indicator--20c88590-7576-4c24-9aee-62d7609cbe8f",
"x-misp-object--e3268eb8-ff83-4c94-a785-62496de9011d",
"indicator--b138ff77-a9a1-4c08-bafe-29b0523b4ed8",
"x-misp-object--633551b4-10c9-4b6f-9016-48b408fe38a4",
"indicator--d66b5ccd-9abd-4f3c-9568-1d70c53d9bc7",
"x-misp-object--e778b89e-a884-4832-abde-6ce011251693",
"indicator--0892831f-a928-4d72-8fce-54a4e11fb7c2",
"x-misp-object--c1f6c155-6147-4028-ba1b-a80b9dd7ba04",
"indicator--db1caacc-9b02-4c97-91a3-e53e3e1a06dc",
"x-misp-object--43e01f3e-90be-425d-8ec7-de09b4b709be",
"indicator--67b2d93a-98eb-4c8a-9d16-4ad49b550d26",
"x-misp-object--3df48692-1aae-44e5-ab1d-8e3f51964c1a",
"indicator--ae30abe7-aaf5-43b8-9a86-da761337167a",
"x-misp-object--c8abd4d3-60c6-4618-844a-b449f10e295b",
"indicator--020da26b-fa49-4c8b-8c1f-1e9c9720417a",
"x-misp-object--4b92ac74-45c4-4016-834b-d2bea2aa65e8",
"indicator--bcfb9a53-5b69-4ac4-a2ef-18fef63ea165",
"x-misp-object--e49d9375-8dd5-4055-89fd-07955351f316",
"indicator--c008b064-faae-4e2d-b895-7a3386442500",
"x-misp-object--6b181382-5e85-4d8d-8841-f7d56ba607a5",
"indicator--a1d90f3c-1df4-47d6-a972-60df22e745d9",
"x-misp-object--6477d441-4a92-4916-acd4-43b19d16a375",
"indicator--83c71c43-77bc-4dc1-9ac8-164993129370",
"x-misp-object--1e276f55-5833-4810-8bfc-bbf15fb87297",
"indicator--d66b49cb-0f4e-4fcb-8233-a006348455ee",
"x-misp-object--b7668932-8d26-4ac2-af13-2ed08885bcd6",
"indicator--e9d100a3-05ab-49d1-b1c9-0e8f2383befa",
"x-misp-object--b35d1dc0-4300-4cc1-902a-5d9b046400df",
"indicator--fe995598-bd9e-409f-8ea4-c08712c1b9de",
"x-misp-object--10484feb-f108-437b-9229-acfc6b10217a",
"indicator--ed1c5751-bee4-4a8c-97d2-a0073741bbe5",
"x-misp-object--72f27ad6-4f8e-4276-b7fd-287b9d809f48",
"indicator--42a8a23c-9b54-4482-8a50-046820505d98",
"x-misp-object--5fb36872-a865-41f8-bb2c-3aa9e2706869",
"indicator--7ed9d6ef-d823-437d-8281-4c9949d2b6b0",
"x-misp-object--7f6d2249-26cc-4a41-8db2-19b133559d95",
"indicator--9495bd5e-39d9-40da-951a-008a0f307829",
"x-misp-object--7a0ea506-37ef-4646-97d7-5574970b30b6",
"indicator--2f57ac50-c7c9-4a20-b794-a714dc18fd80",
"x-misp-object--43401fe1-3ad8-4d5e-ae34-03c4e6b1187b",
"indicator--174ec337-9a50-4f85-8127-3a95078ecd00",
"x-misp-object--9e6aba26-4bc6-4749-9af1-5e33710786ba",
"indicator--d60d4a1a-e213-4e2a-a245-02347da28512",
"x-misp-object--87acea24-f544-414b-9337-4aa282031caa",
"indicator--7f797fe4-795e-4152-94a5-ca85ad81e2e9",
"x-misp-object--0df2e9df-4106-48f7-9f4f-6bf91b431e11",
"indicator--46998b72-d9b5-4392-868d-0c843d34fc00",
"x-misp-object--f98f0864-6f07-45b0-b0f4-0c88c07dffb0",
"indicator--80685b00-a882-4132-9551-286ab3b430c2",
"x-misp-object--bbdca7b6-37ed-4ae2-aace-f71b4c8ac0c0",
"indicator--2f15384f-e5ea-4e02-851b-9ecbf3508149",
"x-misp-object--f1bdcb12-3b65-4f80-8ee4-063b9b5b66f7",
"indicator--2b0031ea-445e-4619-98be-8c0059ec1b62",
"x-misp-object--3bbcd9ed-3e47-470c-b431-e70443010365",
"indicator--9a1ed464-4795-470b-820d-77ebba0fd9de",
"x-misp-object--8e4dd566-7edf-49a9-8dc7-294cd59c3b80",
"indicator--436515ee-125b-445a-b9bd-0326cc980910",
"x-misp-object--7b789516-52af-42e3-a4d8-402725bebbad",
"indicator--c18d5005-8d30-4b08-8b79-5471964d2686",
"x-misp-object--aad037d0-ccc1-42ad-9e22-b00255d02d6b",
"indicator--f21c8928-a0ce-47df-af6d-1dc4800e6684",
"x-misp-object--092b2e56-e71f-407e-ae75-1048d5d294aa",
"indicator--26ed6d13-7ede-45a0-9d75-8484cbe26f82",
"x-misp-object--3bc35d8c-6cd4-4946-bde4-deae4dae2192",
"indicator--a378e561-df52-488b-8b61-9c31848fd405",
"x-misp-object--5d9c9579-9bac-42fe-b4d7-d2c99c2e7f26",
"indicator--1fc063d9-da6f-49e5-9aec-04541560882f",
"x-misp-object--c66e9d99-b3ee-4276-9bc4-e16197dc1343",
"indicator--a2d020e6-f709-4ed7-9c48-90d666c9f95b",
"x-misp-object--164fe582-c64d-4e47-ae0d-a7dcd9ee6410",
"indicator--d012ed78-ce5b-4169-9631-e80bd8e8f78e",
"x-misp-object--039c4cb6-78a0-4ee5-89c2-4e3fbb5d9db8",
"indicator--f0892f76-ec4f-4948-b54f-a7e56ee990ed",
"x-misp-object--90685d7c-a0d2-4413-894e-7c1d95f10924",
"indicator--e55e7446-e0ac-4f7e-b4a7-7de1d3a96e50",
"x-misp-object--9c601eec-34f8-4883-ad4c-991beb9c5313",
"indicator--f1bc257b-1f9f-4ffe-86be-35ffd892f3b0",
"x-misp-object--c7bfc277-b689-4282-a52b-723f92964fb0",
"indicator--b9b8ff6a-80a9-40a8-aa1e-000583538507",
"x-misp-object--bc28e52a-d2b1-4db5-98b2-b78814197fd0",
"indicator--5557a9c2-2926-4aa6-9091-3871ebd874d7",
"x-misp-object--7888f078-6e6f-40d0-b426-fbf99c5e25ce",
"indicator--d9764fb8-d509-4b1a-9b6f-434bee32f6e3",
"x-misp-object--99b98df2-668d-495e-b127-d171c1d9d3c8",
"indicator--64348811-02d2-43c3-a49e-65a3d4491dcb",
"x-misp-object--521302dd-bf8c-4040-a8f9-026216bf0ada",
"indicator--56e47645-eac8-4997-a5cf-32192544f4ea",
"x-misp-object--f6103ca7-a9aa-454d-be10-d6fbc27699f1",
"indicator--31f4b6b6-e16e-41a5-9f5f-d451220d62f3",
"x-misp-object--2ae0b87d-3b07-4a7d-a8f3-280f94879967",
"indicator--32d62c01-a77d-4a61-91e2-e479232e89fa",
"x-misp-object--f4223054-bc53-4228-92bf-02380266e4d5",
"indicator--bbeb2a80-fffe-4959-a634-6d1b92c27966",
"x-misp-object--68c69bf0-47b9-4ea2-8531-239821114309",
"indicator--fe568963-2dc3-417b-99e1-5ad9a83f40db",
"x-misp-object--df245559-1f77-4c8e-b92a-873b30f1c2d5",
"indicator--18dd827f-22e9-4c33-b517-6cbcddc95a21",
"x-misp-object--e6a3fa3d-87e2-45e3-af5d-d6991ae8e074",
"indicator--bd8efd15-6af3-43ba-84c8-eac4769883cf",
"x-misp-object--618d429f-6a91-4bba-892a-c719cf60cea3",
"indicator--277f3ee6-3d34-4038-abcf-2499c69b02ce",
"x-misp-object--f4efd30c-0621-4634-a2ec-478ab941efca",
"indicator--9478791d-a2ed-4bbe-866c-f36e552defdd",
"x-misp-object--837f0b81-3cbb-419b-82d8-2bb5de26578c",
"indicator--25ac76f6-4ab3-4d15-a4e4-4c5536e0520d",
"x-misp-object--b8393ac2-5026-481f-82f1-db6fb4b48d28",
"indicator--1270a24c-137d-42b8-8bb2-f327d09c62d1",
"x-misp-object--0bef6eee-e08f-4405-9ffa-7b98518e0fae",
"indicator--44a433bd-8cfe-4150-ac8d-16ca5a4982fd",
"x-misp-object--5bfacbe9-088e-452b-864b-e4e0071f5dd3",
"indicator--b80818b7-46c2-41f2-8274-9bd66c2441b3",
"x-misp-object--b55faed7-7aa6-460d-885e-2c47abff9462",
"indicator--b1f1d953-5872-4004-bd05-9fa658e326fe",
"x-misp-object--dd23efa6-454b-4338-82cd-ff495fb2b32c",
"indicator--a20fd02a-a3bb-45a2-9cdd-537570f9d775",
"x-misp-object--9dc0eda8-c956-43e1-8bc4-5c88a5da9d9e",
"indicator--2e2cb479-1811-4020-91b1-64206c1c3bf9",
"x-misp-object--a681ce5c-c6b9-4dfa-86df-b14f736d5727",
"indicator--ca040b60-0f2e-42d9-9503-73c4fe312591",
"x-misp-object--4c3be041-e873-416f-a301-ac3f2e8ba8cd",
"indicator--41cff4ef-ba06-42ac-a0a6-01e30418969e",
"x-misp-object--5f59b1cf-7051-497b-85ae-26bb254d7664",
"indicator--1f9b7984-58b4-4bdd-9b7e-c2782de29504",
"x-misp-object--9c900612-9431-4577-8580-6099cfb0e4d4",
"indicator--a731aeaa-5c51-454a-8690-3c7622717b8c",
"x-misp-object--dbba2e99-1c39-493e-b7f1-5e50c4b677dd",
"indicator--17f52d1f-c8ce-45c8-996b-38d624db86c9",
"x-misp-object--f48c3488-0954-4be2-972d-05c233558f73",
"indicator--ca0e53e1-d879-426b-9b6f-a60fc942957a",
"x-misp-object--85d876f7-0257-4977-9817-d92fe656f507",
"indicator--c95b1e9d-e2de-413e-9ffb-4b87f049250b",
"x-misp-object--83fe5578-3bef-44db-a66d-be68a3cbc329",
"indicator--06e88af6-9100-4e50-aed7-494831bf2a2a",
"x-misp-object--e24a4551-324f-44dc-a13f-3fea25676610",
"indicator--59eda1ba-179f-4293-bd44-50871517d08a",
"x-misp-object--d834c18d-a902-4c28-857c-4a0da7c92148",
"indicator--a2c02004-e597-42d9-8a99-a8e678e68dfd",
"x-misp-object--d575295b-27a7-4e8d-ae64-606955c6bcc7",
"indicator--becac4fa-8cc6-4b3b-823f-cb2f413a18c8",
"x-misp-object--34023aca-655f-4916-b588-65ed3f78c8cc",
"indicator--df145429-2ca1-436f-b388-10fa744f43db",
"x-misp-object--6c998244-f800-48ff-98d8-3f232c8f21c8",
"indicator--78f1fadb-c0cb-4ea2-8aec-0c43d2f960e0",
"x-misp-object--a0a0caae-59b2-41c5-b073-243c37515fba",
"indicator--b1adda64-9a8b-4634-8e63-327e75d42eb8",
"x-misp-object--f7b56700-8e0d-4fb3-9a59-08cef7c60a30",
"indicator--ee11a006-60cb-4c20-b2db-27b8408162d1",
"x-misp-object--61bc1c8c-cd0e-4f35-87ef-c686650b7622",
"indicator--44b91ea0-d5c5-45b2-b85a-cf3d37d53086",
"x-misp-object--483cd876-ce01-40a6-a4d2-0f11987cd0da",
"indicator--6b50419e-57d0-43b7-bc75-8c92995bea47",
"x-misp-object--8a1d430b-966e-4e9e-86f5-fcf619c3dc87",
"indicator--78c3f029-acfc-4d24-94f2-18058e811bd6",
"x-misp-object--73af1f83-a272-4099-b219-b05e77c7d7e1",
"indicator--e2f6f53c-1b21-4f9b-ba9c-da35fc181c97",
"x-misp-object--e19b532c-dd5a-4278-ae1c-372d66b8b146",
"indicator--7737ccff-f82f-494b-90cc-1b22e2c2b6b5",
"x-misp-object--0d6879bc-8075-4bf5-9a98-f06c6991f1ac",
"indicator--08609b6c-4c68-4ab4-8a22-8ce67ae5dd55",
"x-misp-object--1f4d6780-90cb-4281-95a5-6524ce6145d8",
"indicator--2b485a76-ed4a-4832-8601-93576827def2",
"x-misp-object--bfe8c8f1-123f-4fbe-9a57-ca43bda77bbb",
"indicator--ccb0100a-cc61-45c9-a42e-946b0b9a2bbe",
"x-misp-object--3d1d4143-fd00-4946-b5c3-227bf730b271",
"indicator--d28c925e-1dc6-4915-8cc1-31b30c1d3d77",
"x-misp-object--7295e73f-9200-4da9-9cee-1235ab0ef8c0",
"indicator--031272c7-aeea-4886-bc0e-c82c2399ced1",
"x-misp-object--6279338c-1317-49e5-9fa3-61d39d1fd85e",
"indicator--dd1b94ca-12df-4746-81b9-0f2762545592",
"x-misp-object--345cb4a5-817c-402e-8306-11ac04b71d83",
"indicator--2ac12e74-5306-4785-82c0-7ba96983994a",
"x-misp-object--b55def3e-7c02-45e4-8e38-55ae68cfc362",
"indicator--b5b1d0ad-ca31-4465-b922-bc5cdda1fe8e",
"x-misp-object--bcd5c109-6f56-4f18-b58c-0866365f87b1",
"indicator--3f19950c-9a19-4b31-8f00-1af92d3a1bc0",
"x-misp-object--1d20673f-8d52-47c7-9740-2ba5d4dfcb48",
"indicator--4998219b-3f2a-4415-9120-aec6680e1e44",
"x-misp-object--80e03ba7-89f4-44f2-a0e4-6392a20743b2",
"indicator--bfdac829-84e7-422b-98b4-6c2668aa0587",
"x-misp-object--af568763-fed7-4558-9441-26b2cc6362b9",
"indicator--86bad043-2708-431a-ba23-f83d6450e4ab",
"x-misp-object--35347bf8-788b-482c-b431-3b6258b1e9b8",
"indicator--8e08f62d-c431-4475-a0da-023c8f670606",
"x-misp-object--a3062c18-d293-46c0-9175-e3c86691eea4",
"indicator--cb23222d-61f4-420f-97e5-208d0df4d905",
"x-misp-object--b3c43305-f706-4271-a3cc-9dd6a47f013e",
"indicator--be84377d-270c-48ad-bd4e-797b86509254",
"x-misp-object--54a18057-87d9-4091-a8f5-e919a6af8f8e",
"indicator--b97217c8-a47e-418f-9dd7-089aaa3ad22c",
"x-misp-object--738e4e9c-f2c7-4297-90b3-6f559923bbf3",
"indicator--e06f91b8-355e-4ea7-9de1-3aa5a3b948bc",
"x-misp-object--9f13752e-3013-45e2-90ec-6b5a99066505",
"indicator--d294a9bb-d773-4cf2-8e2a-3fd99391206f",
"x-misp-object--f61c6948-4f4b-4145-af51-b50999bace44",
"indicator--82299055-ed80-4537-80f5-9436f519f766",
"x-misp-object--2d2f3ea6-6d2a-46eb-8fa7-fe52ec43d7be",
"indicator--d6278a28-8753-4bd3-b5dd-b615a535c947",
"x-misp-object--e8b635f4-5d5b-4caf-9d35-c214b6dab867",
"indicator--cb61ffc7-25b6-4635-af6f-bed3089af7e9",
"x-misp-object--804d7a0d-4a71-44fc-a954-6dc9def20bbf",
"indicator--cccbb05d-835e-45c2-8022-a743d3ad5851",
"x-misp-object--8d5816f1-dcb6-4f83-8356-64b3ec5b3ba2",
"indicator--d7d6852a-a95e-4d3a-84cb-06b3701e6a6a",
"x-misp-object--c3a835d0-178c-475e-8d29-863ad198edde",
"indicator--82a15bb8-9f6d-407e-b744-bb8b9fee2159",
"x-misp-object--f2656df0-ab61-4366-972e-eb7ccf26e9f3",
"indicator--69820f4d-ae64-4f60-b206-e7f473a8bb57",
"x-misp-object--1712c055-825b-4483-a0d3-dfaa467814df",
"indicator--1244ab55-e050-4f27-8815-9829d0d09a58",
"x-misp-object--51b0df0d-f04c-4a11-8e09-bb63da256b07",
"indicator--3308282a-8f19-47ed-81c4-f5f8cd8d007a",
"x-misp-object--cf6405fd-7401-4d60-a130-a6224cc18428",
"indicator--b7aed3f9-8bbc-49b9-96ef-1185d97372fd",
"x-misp-object--3e466307-8e1a-4b17-b923-67ccffe9fb67",
"indicator--21b42c11-3463-4f2e-9cf5-dc2f947712eb",
"x-misp-object--5f436b33-8051-4e11-85ac-d19712b3b5f0",
"indicator--83a08501-1293-44f5-972c-a638468112d9",
"x-misp-object--4578fb47-f580-41dd-a90f-baa104b9d39b",
"indicator--dfdd74ed-2446-41e7-bf1d-e876e277a29d",
"x-misp-object--57ebad98-e219-4c11-8ba9-e89e7c956763",
"indicator--9bc65993-ca59-4309-83d8-0444b2fb8c06",
"x-misp-object--af6df848-4958-4d51-b02b-f26f53e48132",
"indicator--978c6c81-588f-493c-b3db-a6d8a2a47990",
"x-misp-object--aea5d4a9-d27a-4a59-b732-317d060c8df3",
"indicator--b4ac89c0-7022-47ba-b5b6-b7d6f505aebd",
"x-misp-object--cea5961c-f56f-47ed-805c-8ead55535284",
"indicator--5c173e41-3f6a-45b7-8dc3-9fd00209ec77",
"x-misp-object--e8449b46-a354-467e-9e49-68031b6e1752",
"indicator--620fa80a-ff56-4958-893f-c9178f12924a",
"x-misp-object--f6d1820f-b409-4ae6-8576-398772a06e02",
"indicator--2b5a4323-cc12-4e0f-b80f-932c607e3061",
"x-misp-object--914a9489-58b9-4d1c-9bfd-c89783e85427",
"indicator--5fa6a990-0c0c-45a2-b44f-8f6b2fb92d30",
"x-misp-object--29ed7fda-0038-4836-890f-220300a61011",
"indicator--b8edda24-98d3-4d12-b8f1-0b075e5127e1",
"x-misp-object--f17b3e60-ddc8-4acf-9c1a-23484fb6bdb4",
"indicator--856f07d3-d2ca-4f97-bcc9-9c42047e154b",
"x-misp-object--e81ed941-5baf-4a9f-9478-1a82e2806177",
"indicator--67d15086-8265-4536-835f-eacf118dbdcf",
"x-misp-object--4934a6eb-4335-4e88-ac95-11ec7ce3d651",
"indicator--914b8dcb-39b8-41e6-9314-701cb1685d55",
"x-misp-object--c3b196f2-3089-4461-9f1e-e2ded8cc54fb",
"indicator--d2a0d57f-8bd4-4f7a-bd2f-558d1ccc9e42",
"x-misp-object--994a0748-7980-4a57-a95b-2ea57fd7169c",
"indicator--08a40cfc-aaa0-4762-9aec-343975e97a59",
"x-misp-object--7c08f3f9-329e-409a-b4e2-ee8071725fdd",
"indicator--d9defefd-c657-4cd9-b750-a295b80285fa",
"x-misp-object--70c8bcb8-ca3d-4852-b4aa-8638899816c6",
"indicator--c227e4dc-e420-45cb-9f53-1126208d93ed",
"x-misp-object--cbca6d38-3a3d-4c08-bec0-22e39f71f2eb",
"indicator--ddc8833c-f045-429a-9866-12bc325e4a8d",
"x-misp-object--8f991164-986e-4588-84a1-017fc4940631",
"indicator--413a18c9-945a-4bd1-b541-691bc530c2fa",
"x-misp-object--7e632066-66c8-4b57-844b-3e57c53c0644",
"indicator--5cf33f8d-dd97-4611-8b61-97b2763a0bd8",
"x-misp-object--b267d777-f810-4701-b57b-47643fe6e370",
"indicator--8a341ca2-f68a-45ed-9c09-cacdac4e43ba",
"x-misp-object--949361d6-c71c-4ab9-b3b2-5fdef6a8549a",
"indicator--05e14172-6a5f-4438-9cf9-18601485fee8",
"x-misp-object--718abdcd-3f1f-4652-9751-33a11b262a4b",
"indicator--ac9429a8-1a38-443b-ac79-947e77c20362",
"x-misp-object--64350fec-6cfd-440f-82ca-f42b591d4a6e",
"indicator--22d8e158-223c-4edb-b351-461809ff16af",
"x-misp-object--d8c73c7c-20f0-4816-8447-5bfa171455f8",
"indicator--bc5863ac-57aa-4555-91f3-f8cddfd3a380",
"x-misp-object--fd565702-5854-489b-9168-aa56033b44b8",
"indicator--37650bda-445d-45fc-89bf-25645506db23",
"x-misp-object--adf2edf5-1bf0-43ce-bb48-03b0d632410f",
"indicator--12a9552f-dcfa-4b1b-b9a0-8577c5f592d5",
"x-misp-object--996697de-50d0-4c27-ae0b-f7cf1d789da0",
"indicator--dc1da79a-987b-4226-998b-f6befaa03fb8",
"x-misp-object--1456abf1-55d0-43f6-9a4f-e91acc35882e",
"indicator--4775ae1d-ebf4-42ae-88cb-2d9e7b7e3485",
"x-misp-object--81d57356-7bd7-44dd-99fe-a227e1ac00ab",
"indicator--8d8f022d-7e99-4d4b-9999-3c7bb3331ded",
"x-misp-object--720e4a35-25aa-4682-91b8-74d26d2c83ae",
"indicator--c0993f0e-c4c9-4607-8438-5f67688c20d6",
"x-misp-object--3ce18542-570a-4988-b75b-702cfa1a3c1a",
"indicator--97971b0a-3559-409a-94ce-36fb05fbf4e6",
"x-misp-object--1627866d-dabf-4069-bbe2-355f3f0a9647",
"indicator--0fa0b818-b2b2-482a-8567-cc8996d54f49",
"x-misp-object--816947c3-4298-4ae3-bb19-8e2b8986ad81",
"indicator--66f170fb-5db2-4ede-ad9b-121ba032c974",
"x-misp-object--6af3ebc6-434f-441d-ae40-b876937c8612",
"indicator--21046835-1b5f-454d-8fa7-a0d11e43314a",
"x-misp-object--5ffcf6a5-9852-4f0e-a619-c557f9bafee2",
"indicator--bc18d46f-3297-462b-bcd7-6db52efaf56b",
"x-misp-object--fe44dcc1-5471-4572-aebc-7fc43c58831b",
"indicator--9bff3672-c80a-4c16-b2cf-35a63fe86433",
"x-misp-object--8670cf25-98a7-42aa-9cc2-e2e9d90a037a",
"indicator--4225cb42-201f-47ed-ad03-c0f4543cb253",
"x-misp-object--26451a75-cc08-4fbc-87da-436e2cde572f",
"indicator--e43eb2dd-268c-4940-a19c-8c059cee8e40",
"x-misp-object--c336794f-46a9-4009-b240-e5cad850bb96",
"indicator--da460413-76f6-41a0-a2b8-1542e365d0fb",
"x-misp-object--0677e0d0-8a8b-4754-bb9e-68525e65a9d5",
"indicator--0b4ad0cd-6a11-4eb2-a62e-85f88be78b2a",
"x-misp-object--49f5f1f3-16d8-4061-b055-0b6335db369b",
"indicator--40314b91-c2b2-4eee-9c6b-2fe46238896e",
"x-misp-object--6e14b2cc-41af-4ef4-8810-6dcf339bcfcf",
"indicator--8823252f-4421-4a25-b020-6c4d71b72f3c",
"x-misp-object--70eb97ff-b5cf-4a33-9c55-b66c838dc136",
"indicator--4c585e51-1879-481c-a50b-8ecef2fbfee3",
"x-misp-object--13068af6-8ddc-4e99-a409-deda2159b103",
"indicator--37a19c4b-d0e7-42c7-9611-445522921890",
"x-misp-object--edcfd0af-4e00-4bf3-bfb2-f5e14e215c96",
"indicator--1145dde9-b4a2-472a-9d5c-b9b6d48ed3a1",
"x-misp-object--06473880-41e8-46f2-b9c2-4cee0e116855",
"indicator--b3edef8c-598d-40e5-bb2d-18647024b51b",
"x-misp-object--fbbb0d5e-64de-4be0-90d7-a093afb63f88",
"indicator--9acd5c23-ef98-40a7-bfc9-caf28c3f23eb",
"x-misp-object--aed42feb-e540-4b67-961c-f67718df57a6",
"indicator--ab226ccc-8a64-436f-ad9a-9be4b5777b0f",
"x-misp-object--44bf11f9-5d56-4ca4-882b-6702bcf34a30",
"indicator--927f792b-19a9-4c29-82a9-b32675909be3",
"x-misp-object--0d77908a-f0f7-4781-97d2-246bdbee37ec",
"indicator--7a0a06e2-e651-4fd1-a48b-4b88352b1c4f",
"x-misp-object--1ecae68a-3fa0-46b5-9a9c-4ef390e211bd",
"indicator--1c2f9b9e-1a6f-42bd-93ea-8b0df438103a",
"x-misp-object--ffb0fd88-2cc2-46da-869b-788448ed5ca4",
"indicator--80c4fd2c-a08f-4ba7-bc29-6e29ea981bd0",
"x-misp-object--42229f3c-506e-45d1-88d3-4e2c9f27ccad",
"indicator--8d8aeabc-15b4-40f9-9bc1-7b07df4455b7",
"x-misp-object--c7f784cb-512a-4528-b270-ea27855f4166",
"indicator--509e750c-3a95-40fa-ad9b-76f22cdc492b",
"x-misp-object--030a8ee8-106b-4afd-9a08-f135111ee17f",
"indicator--8aea02c3-b7ab-4049-a7d0-574248ffc5ce",
"x-misp-object--9fe05add-499d-4dd5-a632-7f6283f12006",
"indicator--9f4251f1-9409-47b5-a6ab-bb1b0eb81236",
"x-misp-object--a6c66b4a-943b-4095-89fe-af13049c2857",
"indicator--627d360a-1b2e-450b-8fba-76deceb75528",
"x-misp-object--04de7a55-7030-479a-9a54-1b3b5857a7cf",
"indicator--d34ba1e1-ea64-48da-8df2-4ac0c83d2174",
"x-misp-object--64bec757-4f02-4661-be85-d133f1f916f4",
"indicator--95d5d4b0-6b7d-4606-aad5-deffead81484",
"x-misp-object--8c3771ce-366b-4cfb-be18-490fef4a77e3",
"indicator--7e2b3829-7e79-4457-8c46-52cc0a4c135b",
"x-misp-object--7cfdff1a-969b-4132-81e2-91db2d53b935",
"indicator--6b7e96a4-c224-4cd4-9463-0a4abfe1310c",
"x-misp-object--6d78971f-8ac5-459a-8e28-61152f4387f6",
"indicator--6d443c89-c0fb-498b-b29c-f70a8e9b7441",
"x-misp-object--f7e1ca9a-c724-4270-b711-d7311d1bf670",
"indicator--8bed1326-1a1d-4928-8b15-a0b7ca1ee902",
"x-misp-object--49292793-cd90-46f5-826e-83edb402829d",
"indicator--d1bc2cce-a622-49f4-aeb8-5b953ef057bd",
"x-misp-object--320498fb-361d-4be2-bf24-c44442ba1d43",
"indicator--139c2340-d819-4e2a-b7ef-5db4b5456996",
"x-misp-object--11fc4165-9256-452c-bd57-91eea67d52f7",
"indicator--9a4100e0-80fa-4c58-8ea4-c72ae84eabea",
"x-misp-object--529f731b-28af-4b92-a2e5-02df29872815",
"indicator--136020bc-9d22-4ff9-8ecc-0593daa5cdc9",
"x-misp-object--a0368a1c-1331-48d8-be77-72246033e74d",
"indicator--df75d959-0373-4dcb-9d03-661b2e89367d",
"x-misp-object--dd4de532-cdff-43db-9b08-383978d10ecf",
"indicator--7cf04113-a5ef-4039-a3e1-ffe4ec7290a3",
"x-misp-object--b9d2a895-a418-495d-a507-6ed53e60da61",
"indicator--2921db48-769c-4001-86d0-7f439fd5895a",
"x-misp-object--744bd821-f292-4972-a1c0-9ef1cb1501d8",
"indicator--3b4dddf3-912b-4a36-a71e-036980f6e913",
"x-misp-object--7f3cc856-802d-426c-8c22-246dc019e2cb",
"indicator--e12bb0ee-a69a-4146-b055-56ca6d2cc0fc",
"x-misp-object--9489f5d2-ff71-4fd0-815d-78330163a252",
"indicator--2176c24c-867e-4722-a4f3-93baf925f23b",
"x-misp-object--01a3a067-3cd9-4ad4-9d0d-edcfaeff95e9",
"indicator--d99541c3-21f9-4e43-a072-f9f348acc61a",
"x-misp-object--004be45d-0741-4968-86ee-422470e10454",
"indicator--d3259046-b495-487a-ba1b-213849af711b",
"x-misp-object--84bf6f44-a6f7-4787-b77a-8aa652de24d1",
"indicator--4b42b7ba-a997-4165-ba35-d68532e67774",
"x-misp-object--17a3fa4e-9caa-4187-a01f-829a2a81b273",
"indicator--af041428-4279-46bf-93f7-95a9ae7e9ac0",
"x-misp-object--a4eaa802-abe1-41ad-8dd3-d0ce3294cb7d",
"indicator--908010cd-28a0-4f08-a7a5-69281f864864",
"x-misp-object--d989e4a7-23b0-46e7-813f-00cdf793e023",
"indicator--2df4ad14-cdee-402f-9b29-66314a34cfca",
"x-misp-object--ae6eff32-1af2-4531-9939-8eefe6ee25dd",
"indicator--4ebe1cd8-46c9-4f31-a5df-525f4d91d446",
"x-misp-object--1c2bcd49-2485-4949-a704-8b12e30d65e3",
"indicator--b0da95dc-a85b-498e-a0f0-679b8220ab3e",
"x-misp-object--11c2e221-8fef-48d6-a2d4-9699d52ca330",
"indicator--fac77102-1466-4b49-af45-0081aa168519",
"x-misp-object--b430aab1-6ef2-4ec5-9720-0805c1640c39",
"indicator--45b7e720-e0f0-4621-89a8-be81720d360f",
"x-misp-object--2e00b881-7805-493f-9af6-3dd03df10987",
"indicator--3f8e9ff9-7ad7-4167-acc0-a2ceffd681c1",
"x-misp-object--b44e8fc7-c3df-4948-8559-55c3cfa79ffd",
"indicator--d2507aa9-43ee-4889-aef0-76757a8cbd64",
"x-misp-object--dec03b16-27e2-4093-ab38-a00a27bc5a16",
"indicator--0de0053d-c9e3-4ca6-90ef-f56a945de1d7",
"x-misp-object--49283bd7-ffd4-4c00-acad-f7b0e61e4a15",
"indicator--f188e92b-8a5f-4399-b9c9-e745b9398888",
"x-misp-object--f3765bba-c4df-4ada-9640-73b6b56bdcd0",
"indicator--ee9122b3-2621-4f5d-8f22-6936733b76a2",
"x-misp-object--66faec5c-f35f-4310-ae76-b5d133c3d514",
"indicator--5d5cff29-0013-4f58-a217-5ffc70a9b467",
"x-misp-object--8ba5aae0-fca0-4615-a91c-db32cf0e838c",
"indicator--d5de0f3b-09de-463d-85b3-3348fc8a6331",
"x-misp-object--2c00b6d5-4b71-4749-8627-c2f99359e324",
"indicator--9e409b3a-5452-4c05-bdb6-83a7b07e379e",
"x-misp-object--ceebf3aa-a6a1-42f9-b4d7-bc07e1c353fe",
"indicator--a0a7273f-3c33-4691-8ebe-3ce2b0d33c72",
"x-misp-object--b8e6eadf-5c37-4201-9195-f248b9a9ea9c",
"indicator--43c21a39-d823-44b8-831b-c36317700f44",
"x-misp-object--6186ed82-e296-4016-b6ca-b6fefd19587e",
"indicator--b1fe42d9-2519-44d7-b1a6-87056aa9ec7e",
"x-misp-object--f994c47c-ea40-412b-8854-d748ec104625",
"indicator--399781fe-7ce3-48d4-836f-35080235fe53",
"x-misp-object--f08dfd7d-fe11-49fb-b4aa-29990ca09262",
"indicator--a8903b85-2d3f-4c0a-a072-de47670e4c51",
"x-misp-object--6336762e-38ab-431d-892c-11eb2ca40cae",
"indicator--ca64f9b1-2a0a-4762-8f9e-65670a29d957",
"x-misp-object--c15a3bf5-7ff8-4325-af1b-f8cfc5ba01d2",
"indicator--10f161a8-d5a3-4e19-8ba6-31e105782123",
"x-misp-object--671f2cb9-b54e-4da9-bcb3-960d30dedcb1",
"indicator--07bf697d-c098-4b87-acb7-f4634bc6638c",
"x-misp-object--4df2a5d7-3d89-4706-8ffc-c322b2069332",
"indicator--4f394327-9de3-4f16-bd7e-67ae011e2253",
"x-misp-object--c4e37357-07eb-44fe-a2a0-dcb9ebfef7e6",
"indicator--3905e8e1-d889-4208-8cc5-e6f3b7f9056e",
"x-misp-object--41093629-a5d7-493d-8c2b-f479a8fa8529",
"indicator--80aa0c4d-56c4-4304-86c2-8a23da2f8ce9",
"x-misp-object--8bcd1506-8712-4d28-9a58-ca9647175c66",
"indicator--b5f6d323-9417-45f7-a465-2f585eda42b8",
"x-misp-object--45739206-d155-4d6b-af93-2f86cb8ac7dd",
"indicator--9d007af0-b71c-4b34-92e6-57a09987bbe2",
"x-misp-object--8da16671-3dec-4c2a-931d-e88fa1bdd9ee",
"indicator--49b74b3b-9e5a-41c0-9cc6-1ceeaf82fe66",
"x-misp-object--3301e1c0-2d4e-4f28-944a-6c156a8eb79c",
"indicator--895f0bf6-c013-48e3-8d00-7055d79eec53",
"x-misp-object--6d232c0f-d48a-4b00-8bcc-5d72e80bcacd",
"indicator--1a3ff89e-aa94-4403-9b1f-c8b939f194f1",
"x-misp-object--22395f70-e94a-43fe-a45a-d4e21ebc289f",
"indicator--8d76e8fb-32e8-4b38-a540-8ab6539c1a13",
"x-misp-object--d6a57e30-b781-4431-96c7-a3922f77c64f",
"indicator--8ddfa5e0-c492-4661-92cd-e927230d5b3d",
"x-misp-object--ea151dbd-2122-4785-9e0b-4adee906b295",
"indicator--848a653a-0ff6-4b48-aa3f-ed315f673c79",
"x-misp-object--44e7f385-7e2c-419d-a1cc-9a62e0cb1be0",
"indicator--79a94358-05a4-4a42-80fa-7449e6261551",
"x-misp-object--692fc00c-4eb6-45d1-9772-d705f620d05f",
"indicator--de1f9e1e-cc20-4d3d-ba3d-ff289e81ea2e",
"x-misp-object--bd207aa7-e09f-470d-81da-8745020f58d5",
"indicator--dafda082-ec7e-46ff-a7c8-41af48f58dbd",
"x-misp-object--79f3e338-4702-4264-aa1c-c03b057e5207",
"indicator--89038c85-d67e-4771-afe8-5a91d9d6edd4",
"x-misp-object--36eac465-9951-41e9-ada5-3b203a4ad794",
"indicator--dcca29bf-3545-4c53-8410-5f92da6d4820",
"x-misp-object--8a9d68e7-d771-4af0-a4a6-4fb30dbfea47",
"indicator--acb977e6-4468-4ac7-b23f-21c5f5636112",
"x-misp-object--4fe83c08-1055-407a-b799-ded69ab4fccb",
"indicator--bd503999-5a9e-43ea-bb23-776ad89490bf",
"x-misp-object--a47bd8da-bdbd-4aed-9eef-a11e36096b26",
"indicator--00af6957-6e5d-4518-a3ab-78db7b785812",
"x-misp-object--e9de06fa-e36b-43b5-b5da-9da311f24fe0",
"indicator--5250e462-e606-43b3-af21-b25d353ca77a",
"x-misp-object--6ae57d88-3897-4d06-aea0-539f68acd4f0",
"indicator--4fa3da7c-2e32-4789-aeab-967e4c7043f2",
"x-misp-object--75254811-0801-4316-b27b-df50b7439502",
"indicator--b10a1850-a549-42eb-a281-15589b9804b9",
"x-misp-object--e131e510-e043-4d38-a582-391c654a491e",
"indicator--f6a62907-ffae-4a96-b58e-a54dc45bdd71",
"x-misp-object--73293f69-441f-4861-8668-9babeecc2ab7",
"indicator--da8a4dce-3681-4781-9bcf-b6cece8ddcee",
"x-misp-object--f0b4badf-9446-4115-bd57-b2a66f55f470",
"indicator--dc5355e8-5eab-4718-9235-f1b551b863a2",
"x-misp-object--2d79df26-7862-4e28-acf6-b6b1a331755e",
"indicator--d5911876-ca1d-4b22-8c38-7119fca9fa0e",
"x-misp-object--487e2e6b-c536-4df1-accb-a29b42e96b2c",
"indicator--0e4cac6a-d9b5-4118-bde4-60ad3a609a8f",
"x-misp-object--146e4c31-21b3-46fe-b8de-7f769392972f",
"indicator--f0b0d5df-1bae-410a-9926-6a0e64f64ff6",
"x-misp-object--69b924fb-8254-413e-9800-544b82939ba8",
"indicator--26df4a37-ab0a-4532-96d1-f2e7c0109bd1",
"x-misp-object--5e7ba62c-dec2-4434-9031-ecbe140bfe09",
"indicator--077ac4ee-08ca-446e-88e3-c860f15d6e42",
"x-misp-object--19dbb91d-5dc1-4a68-beb7-2855a8b55944",
"indicator--16be79c8-3fcf-49ad-9a56-0c21f71a340a",
"x-misp-object--89a77099-d59d-44d4-8a59-0738bb796d43",
"indicator--9652d6e1-a194-4a6a-929c-e7e956850f89",
"x-misp-object--52a4df42-1337-4088-bf56-b667387402a3",
"indicator--d1d8a404-37d2-4f24-9178-8bc2dbe65ccf",
"x-misp-object--97568f59-097d-4e72-b4dc-fd68c408c85a",
"indicator--03e306e0-62ae-4534-912a-59d311bc5ccc",
"x-misp-object--9b39352a-bfd8-4477-ac80-b9092c06bf88",
"indicator--3d85b1c8-be3d-4656-918a-168f4f155069",
"x-misp-object--1c6103ea-83ca-4a82-aeda-c4aa8f13e23c",
"indicator--04b2a401-b201-464d-810b-88383d077361",
"x-misp-object--aa6b3be5-ea62-429f-8e69-13ae6bed6d86",
"indicator--882870ac-fcf6-4458-b142-3c80c26ccbe9",
"x-misp-object--87ca3a43-63b2-4b36-bc14-b1d410544873",
"indicator--d054c158-41ed-4da9-a47d-6a27d632286f",
"x-misp-object--a3318579-3b87-4794-aa53-dceb5cb0f91d",
"indicator--56f36f82-1ba1-4809-a5e7-90cd21f3aaa0",
"x-misp-object--f5228bc9-0596-44c7-a7d1-fb756784412d",
"indicator--b91e8990-cf2b-407a-8991-bbb3608c6b9e",
"x-misp-object--f83f28b9-063a-446a-8f9c-38f9c269399b",
"indicator--e4a9332e-e3d0-46c9-ba7d-ca1c7293848e",
"x-misp-object--320ba851-d81c-484f-894a-701364ece4c0",
"indicator--b3324698-2b4a-471c-b45b-e2f397b81af6",
"x-misp-object--077cc537-080b-4c47-bf21-7df045b20744",
"indicator--9fa8595c-97de-41fd-9276-d562acbefb96",
"x-misp-object--dd2d5a11-f02f-400b-9d17-a9e9147288ee",
"indicator--446c3020-b0e4-492c-bd12-7066f1104d9d",
"x-misp-object--0888e8dc-2d19-41be-b507-e64d24336064",
"indicator--ec43784b-9ba5-4e7f-8dfe-5a027d2a39c2",
"x-misp-object--66b5dbaf-aead-471a-be05-03d7ceecff15",
"indicator--2a2a5f55-bf30-419d-8aca-626ac8cff579",
"x-misp-object--feeab5d5-1436-4855-9ba9-bfd9f5c956ec",
"indicator--5db9b3d7-9465-4c17-96f8-f5ed425224aa",
"x-misp-object--f9c1b826-7799-4c2c-a723-07377a3d1bfd",
"indicator--3be79107-b34a-4c7f-ba2c-fef85b1cee8b",
"x-misp-object--166bda7d-6c12-4ddc-a33f-2d4ef0d3ec3d",
"indicator--6baeead3-c809-41df-b607-ca5848e68fb1",
"x-misp-object--f491f23c-43cf-4453-87db-3607b86510a4",
"indicator--ae8e3d01-4e47-42df-9607-9167544acc06",
"x-misp-object--5062fa66-2e6c-4fe1-8aa7-43cf26de6aad",
"indicator--7fb8d9ab-db52-4104-8f75-f38f288d8b1e",
"x-misp-object--4ee3557a-7d82-4325-9be5-ce3d1ad60f98",
"indicator--6f20eba9-8ddc-4fd2-8308-09ad81eab0c7",
"x-misp-object--be45c6a2-715c-4c95-9375-97988cb782a5",
"indicator--c8442b78-eb30-4e6b-82f8-c493beab29ad",
"x-misp-object--b15ff2f5-a898-4dbf-92ef-2630c13bcb9f",
"relationship--a05caf80-4aa5-4db0-8bd2-1da9047aa3fd",
"relationship--7029a64c-e25e-4529-8ce0-f9b5fc537e67",
"relationship--9ddc7e2b-4bcf-4235-acf2-9e07352b3335",
"relationship--e267304a-d689-467b-90d3-65d2ad59af0c",
"relationship--81b4a52b-fc2e-416c-9d4e-841d5a7f41a5",
"relationship--74370c39-60f0-4e59-beb8-ff72cce180fe",
"relationship--d99deff7-26ed-4512-b8ba-ff46f6c655f3",
"relationship--f9ace5d0-5446-4473-a60b-67f09afefea8",
"relationship--3844cc15-e0a1-4877-b168-60c6690fa89e",
"relationship--3a0bc8cb-7627-4569-a29f-13e733953027",
"relationship--9e4caa88-7e48-45ed-a00f-a5813542ce46",
"relationship--3d460918-8480-4ff9-b996-c146edc9d7d4",
"relationship--4de341b7-18da-4bdb-88ec-96938c038478",
"relationship--161b0233-b941-42e8-a527-1fbd7890edd3",
"relationship--8aa2feeb-8eaa-4b59-a0ba-6894f4a15d78",
"relationship--2bc0f048-e006-45cc-8b2e-e9b3db9b10ee",
"relationship--a2c4b5d9-5631-4d59-a2a1-56b8c65bb94c",
"relationship--963fb0d2-fa23-489b-b96a-9764d595645e",
"relationship--faec3a4b-ec89-4bfa-97bf-7edf629f77e5",
"relationship--041e7e66-40e4-4e6a-aff5-78fd1f7c4d9e",
"relationship--c208d03e-3a90-4dd5-a3dc-a4ea51c958d5",
"relationship--43e6cb7e-45c5-4edc-ab2c-2c31a1d8daee",
"relationship--8d1e8583-f4aa-4c18-964f-325c8ebe07cd",
"relationship--c490dcd8-43d0-40b2-af5b-9b8c6598e336",
"relationship--27768666-2352-49ef-9a0d-a367a312b4b1",
"relationship--1f0c020c-522c-4868-a7d1-912ea168ac93",
"relationship--cdfefa1a-edab-44ff-8738-35c9c9367d7d",
"relationship--19b01242-0528-4723-b84c-939a2ddd631a",
"relationship--a35821ac-7f67-439d-9d4d-366f3b741b77",
"relationship--7fea0e1d-6a1a-45a7-9fc2-fb305ca18720",
"relationship--32048f15-b5b6-4c51-b331-68a519ca0072",
"relationship--e205917a-78ee-413f-857e-502cf6d32f83",
"relationship--7c06d48e-7471-4674-8385-fcfdfaf855bf",
"relationship--706960ec-06b2-44bb-a0a4-b6a069b35ba0",
"relationship--a5abc63c-c601-4f37-af21-c5d55b1260c8",
"relationship--de3c272f-57f4-4e17-b17f-3f251b94c86f",
"relationship--e15bf8b5-daa1-40e0-abfa-71379199c92a",
"relationship--1d5477b3-15b1-4497-b05e-6d551773a7a4",
"relationship--ae069fec-9584-4b12-b096-6d0bc0542298",
"relationship--b388a2f3-3333-45d6-9865-f2fb3d0dfeb0",
"relationship--20570e95-96d8-49fd-a892-1568a488a9fe",
"relationship--0ad76df9-8a45-42c3-8dd3-407837175581",
"relationship--4bde3ee1-8233-4fce-a7e5-01fc35b29c15",
"relationship--9bfc83af-e2aa-49cb-8bc5-ec7e2296fa49",
"relationship--c751bb7f-5674-4863-b211-fabc8c8c7e5c",
"relationship--ddc49bd3-cf2a-4c93-aad7-fe85c458d25f",
"relationship--c0135312-fdec-431b-a171-c75b032ad409",
"relationship--33555f12-88f0-4330-9f39-d94c7ec0eb04",
"relationship--858b49f0-c653-48b0-a3f0-710c62bc1fbd",
"relationship--57bd14b0-33a4-4295-93bc-d153ed2a7456",
"relationship--853bf5f0-2120-4168-a307-6aed7c56f298",
"relationship--8240a81a-f2dd-42a1-88a5-94aa33738033",
"relationship--1c854271-fc94-4282-8e1d-edfa7743a16f",
"relationship--0e590874-1f56-49dd-9c56-98fb35706e9a",
"relationship--4a9ad7e8-0005-4fc1-b9ba-4b68af3aa923",
"relationship--811991d4-598c-43cb-a9fb-2b1eca4b5b1b",
"relationship--7e59106b-69dc-440e-a141-fd870ed7946b",
"relationship--f0ff4c61-f190-4f52-89d2-1ab7820954da",
"relationship--fcbf171e-ce29-46d2-96d7-5e1591293bf9",
"relationship--36c3700e-e27d-4e0c-b1ae-165d3242d5fd",
"relationship--aab253dc-7713-44ca-bef7-412e05a07183",
"relationship--69e3abfb-4ef1-4b5f-9e52-045850c9cd73",
"relationship--d93a236b-f214-4067-b101-524c0997a5bb",
"relationship--a52828b8-0980-4fca-9e4e-f2fb470cf981",
"relationship--3565f8db-5d7a-49e2-a772-e55b6d35cef8",
"relationship--4ab870f6-cccd-4671-a6ca-7e2e041585ac",
"relationship--30d95c4d-3b67-40e3-bdee-61d652a21a89",
"relationship--6cab2053-e839-4341-9150-0746d0a4949b",
"relationship--137d8a0f-d5a7-44cd-9ee5-f5a31c112e79",
"relationship--c94a6c67-4f3e-4c26-be63-cd55fdcbd18f",
"relationship--f8ed39f5-475c-4c37-af49-dc7aed9535b6",
"relationship--2d30e64f-c786-4761-aca4-0705306f2db2",
"relationship--93c4928b-5f9d-412c-823b-a5fffb014a89",
"relationship--7096e01f-f15b-4bbc-91a2-7b95ebf5b39a",
"relationship--9c72d019-89d6-400c-abe5-9b7da0db8b1b",
"relationship--b5e15962-5b4b-41a2-918e-5ce998a7e12a",
"relationship--408e38cd-8a0b-464d-9600-5750497f80c8",
"relationship--2ebd0cbe-1ea2-4b77-b8a9-c2cdc22af3bf",
"relationship--e781b0bc-4e69-4cfc-af2e-140c8a2e49ab",
"relationship--51828391-72c6-4a6c-b5a9-b8cf845e8ce1",
"relationship--ebb8041b-0f3d-48c9-9d01-e779fe832a68",
"relationship--de4a2eee-75de-4495-ab45-7118fef51cbb",
"relationship--327b0fbe-e9fd-49b2-9166-034ac5e7dd01",
"relationship--5b194468-8398-4d93-a108-a37f7d430c7e",
"relationship--179ee5dc-15b8-40cd-92be-41bae531cef2",
"relationship--18d2e4b8-d4b7-49e9-91af-034e6bb75ed5",
"relationship--66d68f38-552b-4adc-bcad-7954b7925007",
"relationship--fc9346a4-eb89-4a4a-a3e6-8183b9f5d026",
"relationship--ec26eddd-5a65-47d0-93bd-8fe51f23e395",
"relationship--a7b14923-f566-411d-b8a8-493d24290509",
"relationship--b215e5ae-ac55-4835-a83f-a1cb80d4842c",
"relationship--0f6951d2-348a-481c-9932-ab21c65dcf56",
"relationship--b15d8813-fafd-4697-be92-661397662b22",
"relationship--ce78b445-4458-49d3-8bbe-e200c995da9e",
"relationship--536f6e4d-3b36-4582-944c-1f5f1f05cc32",
"relationship--7b5d5f37-d200-4f19-a8fc-81061b57b4dd",
"relationship--390e3098-5986-4b68-b158-3f9676aaf0b1",
"relationship--17cd631d-f247-4fd6-852a-0cf7bf19377f",
"relationship--585ad4ef-0354-4bae-9e8c-87b612430ea0",
"relationship--9e4df10b-71f9-46a3-9d80-cd0ccc481af3",
"relationship--7d946568-091f-46b2-bcfd-37ef0f12c40f",
"relationship--f4352ae9-1ab0-4692-861c-c58bd3ff3224",
"relationship--e3b14b54-2ccb-441f-b449-4bbc4a16c9a0",
"relationship--41fce62c-d7b6-457b-987c-124cfc421f43",
"relationship--825d1383-9255-4184-b685-85713f3d7fa4",
"relationship--038188d7-ce6b-4ec9-8f97-e07450d148c2",
"relationship--7714f3cf-f6a1-4dcb-88c5-3dd65bd9470c",
"relationship--7c2fab3c-df62-4ef9-9211-e7ddd6cf3a5a",
"relationship--eaa2bed2-af14-4aae-b6d3-1ef9bf1b251a",
"relationship--f563d60e-f515-448b-b7ba-10de7b825a72",
"relationship--3490dd1e-42d8-47c1-bffd-fa4bf7d66b45",
"relationship--415ee05c-5318-450b-a5ed-11a49e02aecb",
"relationship--b99e3126-e8df-46c3-807f-7879d7e250e5",
"relationship--9a5a40f1-fa6f-4fec-9183-bb21f9df6025",
"relationship--4f967213-4398-4381-9431-160222d5082a",
"relationship--b84fe0dc-b479-4d6e-af32-085f26c0da77",
"relationship--9396cf13-e910-4652-bef5-deca00494890",
"relationship--e492595b-cc5e-41cd-b457-3dfc16f726c2",
"relationship--d2efd808-f420-4350-84f4-5c25c2b76f1c",
"relationship--0630b6a5-6843-46bf-9deb-4f1bc8c4a13a",
"relationship--c910bc97-50f0-46ba-a8ab-25779ae33176",
"relationship--445f7629-4dbd-4eaa-8764-d6371958f359",
"relationship--ec267ca5-d064-43a8-9706-f2995523ca1f",
"relationship--cf4cd696-7aee-477e-b7ce-e7ec9ef32a84",
"relationship--4ebdb2cb-ad08-4b75-a7cf-51845238d019",
"relationship--c55c8836-a5a8-422d-8fc0-c4ff2feb6302",
"relationship--b669728b-6268-4ea0-90e6-2618338442ba",
"relationship--e7cc7aa2-fbaa-43f4-95b8-789b2ba76cab",
"relationship--62b2abcd-399c-47ba-967e-12316583c564",
"relationship--02c764de-9fec-469f-a354-07837668ef48",
"relationship--792c7d75-43b1-4531-9b30-d984a046d52f",
"relationship--0397bf1c-5d0d-409a-a75d-2c0662bd933a",
"relationship--fb8bc43b-ae54-43b1-a5c8-485edad82737",
"relationship--a70a1cda-c00d-4609-8e4f-d702444f69ab",
"relationship--cd63a917-3c8d-4719-9cc2-00860601063a",
"relationship--3ad72079-18f7-4461-9749-3a5b12910f9a",
"relationship--54bcc54c-cc34-4aeb-8332-db75a384be8f",
"relationship--275f31b6-e4f0-49c8-8382-6ff74a0df553",
"relationship--0d9c1035-7cda-450a-a589-c73a98ffb04a",
"relationship--d37e8fa8-0567-4124-a440-5e754bd0bdf4",
"relationship--df9f03ba-b817-47d5-bdd0-38fd9c5016a0",
"relationship--1eb11766-05d0-4512-8ca7-58da8ff664ae",
"relationship--80edbbbb-9f1b-48af-b9f5-43bed5670207",
"relationship--c791a408-abda-4371-877e-e074d8c64ca7",
"relationship--a8cd0c52-3d1c-4e05-b8bd-54dc7c3679e5",
"relationship--a45a67e4-680e-4e21-904a-57fe8e4452d4",
"relationship--97d9651b-1a5f-45e0-947e-166c7969b393",
"relationship--fd2e945f-0180-4ffc-86b1-5a80a8ee4cc4",
"relationship--90ab72b0-2e60-4e09-a956-1642b922d7e4",
"relationship--570d89e2-0e76-44e1-bfad-32422532c795",
"relationship--517defed-cbd9-4160-b005-5f2409319cea",
"relationship--03993976-a9f6-44f7-a873-d0da05c10d57",
"relationship--6a0c65dc-72de-4e48-ad42-d0583b5753c1",
"relationship--0407a976-74a0-416c-beab-67b8d5ca661b",
"relationship--c40c727b-b70d-4f67-b95c-e49890494d0a",
"relationship--3cece2cf-a34c-40e4-bc14-eacf97c8a1ed",
"relationship--760ff314-c5b9-428d-ad85-ab4246a1981e",
"relationship--ebe4592f-ee12-4231-9265-f2dcd35011fc",
"relationship--796d2487-bfd5-4f05-8e00-d920fb16f395",
"relationship--e6699688-1d1c-4d40-a92e-3138495ffa11",
"relationship--5a46f59e-da37-4d04-ad91-1d211ab3d325",
"relationship--1ee318eb-b3ac-4c3d-ad89-a4ce6d47b5f9",
"relationship--126bf721-a70c-426d-993e-b575caa8fc97",
"relationship--4e8e432c-5b5a-43b7-98bb-8a0c1f3c905f",
"relationship--c15c3dca-37b0-4c50-ab5a-2faf10f31649",
"relationship--daa8fddc-8405-4241-a8ef-7b460714730a",
"relationship--6e8fc2fb-8b63-4b5a-ab38-304058229bbe",
"relationship--b925d1b1-fb5d-4ccd-91ba-f2ea12fa8eab",
"relationship--59af7bb9-d59b-4008-bb55-d7bba51c5785",
"relationship--82fb5206-50a0-4faa-8c68-1dd34b23e0f0",
"relationship--96a9df29-730b-4312-9454-3710b7dead34",
"relationship--bee4dce2-cf07-452c-84a2-e8019afb1423",
"relationship--9567e0bd-0484-4b9b-b523-92c0fa1f6178",
"relationship--74450df4-d8f1-45fc-80ca-0e22114eccab",
"relationship--5e4a1035-2fe8-4860-b17e-d16c90321a49",
"relationship--0f796b0b-9f92-4bcf-a047-e11258665b1f",
"relationship--df822842-763f-465b-8171-875ed8ee5915",
"relationship--bd2d5f2d-f109-462a-ba56-f4de0ae564fb",
"relationship--ee63780c-194b-4cb5-b273-5dae45d2d302",
"relationship--04d61206-9070-4815-81bb-8250d32f5d14",
"relationship--cb3a5d9c-56f4-4aeb-87ef-1d9a2433316e",
"relationship--6ba40abf-4be2-46e3-b118-486454f541ca",
"relationship--6f034392-31ee-413e-bb1c-95281dc5a07d",
"relationship--567f4b46-88a3-434f-856c-57692af5dc46",
"relationship--a3a28b87-9aa7-45d1-83da-ba255c2aeb70",
"relationship--8c9b923a-305a-4f81-8e2c-b17ba6d84a3f",
"relationship--418f9e40-b1d2-4208-a5c5-23cc46a1b80a",
"relationship--001ae911-190f-41ef-9124-a662a5bc5832",
"relationship--d1581715-2279-4faf-a256-b201da93c417",
"relationship--303997b5-a8e0-4b73-aa1a-432010e28abf",
"relationship--87d82a35-f28a-43a8-8ef3-b3e947e3cae1",
"relationship--43907ed3-e9de-469f-b00e-d4639e12a924",
"relationship--f24ddbc3-0e24-4c6d-96f7-b4f9fb81476a",
"relationship--2742056c-652f-4dd1-b2f6-1b5af89b1389",
"relationship--c8cb68fe-3baf-4401-9cef-a7438a83734d",
"relationship--74d12f63-d0bf-4c2b-a2ea-dc6e2b0ccee6",
"relationship--ff909ab0-b6fc-40a0-9953-951903021705",
"relationship--31baa216-4f2c-4ba5-bf4a-79883801d585",
"relationship--bc54994b-7f80-4ca7-81bf-14bfb06553a5",
"relationship--338ad0fe-a37f-42de-b09e-42c4756f970e",
"relationship--67044d40-802d-4f39-9c93-225f76bb4377",
"relationship--5c551e79-de08-4e9f-b237-fa9ae723dca8",
"relationship--3641fc36-74f6-43df-88d8-7c32e463f744",
"relationship--d33bc253-e075-4929-b2cd-1390da8feeee",
"relationship--bb6026c5-f7e2-4044-8372-527195a14359",
"relationship--41ba3ec7-2d8e-4f00-ae98-7958eeba66ad",
"relationship--4b2db794-95e9-4563-a829-33af4c2454ed",
"relationship--bf93c659-edc4-4635-b65c-17f72ad43de3",
"relationship--24bdcddd-6dd9-48c8-8aec-563df89252a4",
"relationship--e3373543-e0b0-4a3e-8eb6-4ddb95fd85bf",
"relationship--246d6980-a678-4ccb-9801-0fcc9caadc9e",
"relationship--8975ed88-3e1e-4be3-9930-5dbb9a839554",
"relationship--7c9f58a4-8aa9-4aca-ae04-c2d19449587a",
"relationship--8ef9c650-d2be-4ac9-b137-62e8ef9f9b3b",
"relationship--4fa781a1-5049-46f5-a94a-2fe7a3b2af6f",
"relationship--c920610a-4034-470e-a0aa-443d6f3ba573",
"relationship--bf0d1dc2-9038-45be-8bd7-9a585a762e64",
"relationship--4827a560-7b7d-402b-a188-651bab777c7a",
"relationship--2685d0d3-7a59-4e8f-85da-5e9e6acc9718",
"relationship--3324e196-166d-47d5-9b5c-d8b200c9e0aa",
"relationship--64a3b9d1-5a30-4333-810b-98e52095cd24",
"relationship--fa63c97b-3a7b-42ac-8ef1-e87d0b536f76",
"relationship--cdeba8a5-ebce-4a75-a328-c7f5f3222c9e",
"relationship--6583b8c3-98c0-47d6-9285-0770c0e2201d",
"relationship--90432b69-7690-4e93-8a5b-8a5fd45c5649",
"relationship--763262c8-9a8f-451e-96d5-82b03cabdf92",
"relationship--0e06f07e-cafe-40b9-b10e-93563868b5a8",
"relationship--6ca9bf23-abbd-4e01-ba7d-ebc053a331a9",
"relationship--5e2d4d9f-d712-4c3e-bcde-152c592abf94",
"relationship--ba31550b-2a97-464a-8d26-8f6c3f27cc60",
"relationship--20e9b211-7d9e-4687-bdb1-e04db24d06c4",
"relationship--9aa6f949-c179-46bd-9b7d-a404773e3545",
"relationship--b06a8863-bd71-40b7-b4bd-e5093a1d6263",
"relationship--c0eacaa8-68e7-473a-bbfb-63e7dfdf2d91",
"relationship--e64e9ac8-0be9-44c9-a120-6cbfebe86569",
"relationship--18141fe1-76ef-45aa-9c3d-d08e98d270a8",
"relationship--46b56280-6157-491c-ab8e-a44ce842af6c",
"relationship--da06c3d8-d924-4f4b-9941-34cac18816f9",
"relationship--9b5a51ce-9fd6-47e4-b72c-3e8d737ac1fb",
"relationship--e1d08e5e-62f9-4fc3-bdce-26bc80a30a5a",
"relationship--16c5dd61-f76c-4909-98fa-310e750e28b2",
"relationship--92f61bcf-4319-4558-8a81-a1d9fe281906",
"relationship--83a5cee7-0735-44dd-aed2-054ffa364450",
"relationship--8102d922-4da6-4f20-b173-2b6f80ff17c1",
"relationship--2528e442-343a-4fa3-8321-7beda44bff0a",
"relationship--0fbc851b-8dde-4ddc-85fd-d0425aa01a9c",
"relationship--5fb6416f-352c-4508-85c4-f5932948d204",
"relationship--9741dde1-7d12-4ef3-bf5e-28883e99091c",
"relationship--bdf5ce0a-a730-4fa0-ab2f-c174b75cf5f8",
"relationship--a47c3ff4-d080-4449-8d5a-ab29ddb79b01",
"relationship--1d232cda-629b-4e7d-aa7e-67487d277ba6",
"relationship--45e6400c-26a0-457b-b68d-9bcd60416e76",
"relationship--eb7abdc7-dfc4-4f20-8e9f-63e1afadae90",
"relationship--b5e5416f-282a-4e6e-a309-3f1e7fe2146b",
"relationship--e7227332-e368-40cf-ae14-88d85aef30c2",
"relationship--0ffc0d84-cce3-4182-a605-a2cb9381881a",
"relationship--54734d7a-c1a0-48c0-b489-a9c585501463",
"relationship--27881976-c019-4c7b-b91f-c50af4b7cb2f",
"relationship--5229f45e-0c37-421e-b41a-f4440d6da07a",
"relationship--87b57445-da62-452c-9d12-2094d59bd29f",
"relationship--9d336bf8-6ce8-484d-9abe-e5fa4f92e310",
"relationship--816bae09-8f99-49ed-85fa-c4da6bafa724",
"relationship--b6dc0b07-94a7-4c6b-9007-11f3d44f276d",
"relationship--81775e6d-410d-4ad1-84d7-55ae9f7fcacf",
"relationship--3d4148fe-f1f3-4e74-9402-73d6ba71f4e0",
"relationship--b7199553-4126-43ec-8ed6-591f7907a96f",
"relationship--6f5451d6-f5a1-420e-a208-e9a945d889b0",
"relationship--e0a78ae2-1488-4f15-9ad2-5519dcef2158",
"relationship--7c1c2073-eac2-49b0-9892-a48d27cbbc93",
"relationship--1000ee2a-39d6-4cca-af6d-7d0aaf45bf10",
"relationship--97342f07-bd1f-4ccb-8504-4648a1de4644",
"relationship--e4a3ee0f-9675-424c-807d-9570ff285a74",
"relationship--398e5450-9a89-4735-96b0-956321234a1a",
"relationship--ca94d3ea-4d13-4a10-b9d9-930cc1b00e77",
"relationship--3cae300c-e22f-420a-9c19-702a0124863c",
"relationship--7a104632-67a9-433c-8269-b7b9d52c1c93",
"relationship--6990971d-c1ed-4462-8f04-b2fa6b8a823c",
"relationship--97a0de67-4f1a-4b1d-b622-c6b8398a0045",
"relationship--901c265d-b66a-4ec0-8616-7a9ab3b649c6",
"relationship--3fe2c85f-65e3-4809-91f7-7aa773be66a3",
"relationship--7e33f0f7-63b9-424b-9c31-5a1a30110922",
"relationship--8c1ec70f-0e4a-48c9-81a5-60e82d591335",
"relationship--c0c6f74a-8286-40f4-8fe7-29ba759e33cb",
"relationship--595d65ce-571f-42dc-993a-fed5c66bd2ec",
"relationship--ffab2464-4126-4f0e-aa14-7f29946d7c9b",
"relationship--cbbf43a3-e638-4955-8005-0d99e8cea792",
"relationship--90799475-5376-4c42-bad9-5477d8fca974",
"relationship--6b86ac95-7450-4975-95c0-06f116275391",
"relationship--2be60a59-6d1b-4e03-9193-74b574b3751c",
"relationship--0565e21c-782f-4060-a27a-40e357608ec7",
"relationship--846761e3-4f50-4dc7-82dc-a2d11a03a278",
"relationship--0ae3683b-5c1f-4c06-95a0-7db0f5ddd8b4",
"relationship--881a4947-0c19-4c7a-87bb-9308a890f14d",
"relationship--4224ef77-e4ee-4114-91bd-651f04402bc8",
"relationship--1a0d8177-33ad-44c6-9276-f1ba89579f6b",
"relationship--87e86c77-a33f-4ca2-8bd3-2dd126fb7cbb",
"relationship--2399945b-54cd-4817-bf29-056280674f4e",
"relationship--0466c82f-78d3-419d-b844-e10ec696fd9e",
"relationship--46c21bc8-62a1-473b-ba1b-0e175b35b8ac",
"relationship--6b1bd9ba-e588-4329-a87c-18c88f02035e",
"relationship--ee1e4376-f3c7-466d-81e7-95f5f4700152",
"relationship--e0e6e33e-2970-4709-9897-f7336aa75392",
"relationship--cbf860d7-b7dd-46f3-a958-2e153c900fc5",
"relationship--ab924601-f070-4b91-8bfd-bb695cf10148",
"relationship--88d0faf6-3ea6-4e13-9dfc-7341d1c17c19",
"relationship--c10bdb94-b694-4a70-8774-0c54cf0091ae",
"relationship--05e859ad-73de-4ccc-b306-e1f4118adbe8",
"relationship--ff4fa802-f7ee-4c48-bed4-9a5c0494f259",
"relationship--e3aca52c-a84d-465b-b9e1-578b134e1292",
"relationship--55e3db1e-d33f-402e-a89b-bc463deba274",
"relationship--baac2606-4615-4308-8bb5-34f0319e1ab3",
"relationship--2b6eb221-0d88-4947-bd6b-f2f9f8eba30f",
"relationship--af05fc09-e1ba-4c66-97f9-4795b4bc5d3a",
"relationship--672a6771-6433-443b-ac6f-9a1c194a7628",
"relationship--c8b2228c-3d22-4f17-8d12-161fd693206a",
"relationship--533a5fca-33ea-4d0a-8892-cfb94fe1ee6b",
"relationship--a46b0b75-71ab-4dd1-bfbd-31b30650aa88",
"relationship--58c070a6-cfbb-431e-b991-7e6fd962aa2a",
"relationship--47ddfa37-698c-4ac4-9419-538605bda25f",
"relationship--b8f6c368-7c15-4a9d-a429-d30a0a129aa6",
"relationship--c2e91b9f-89e9-4321-9b85-a3c237a0f2f1",
"relationship--e55d7cbd-7fb3-46f1-bb69-8e4f90e1226f",
"relationship--0f5da1d0-ec0c-4420-81a8-0d3494c8d170",
"relationship--a8259402-990c-44f3-a36a-20dda914eb40",
"relationship--73a7a9da-cfdc-4b56-a330-84ad8e8caf8d",
"relationship--3198784d-4c2a-4838-825f-c56ce30f6af4",
"relationship--91f101c5-b19b-4e55-bfa9-1d43407ec665",
"relationship--30d587a8-94da-4207-bff7-c1555202e2de",
"relationship--16a49acd-8134-46f1-a812-1720a1cd1b9c",
"relationship--186de74d-efcd-4c16-88c9-f59234ef3ee9",
"relationship--74303358-67ae-486a-b1da-7403d8b0f8df",
"relationship--e395671b-261d-42ea-947d-d92660089f1e",
"relationship--9a504a20-02b2-4023-9844-56566fa162c3",
"relationship--890c088d-8857-4927-94fc-cd70573eb7a0",
"relationship--256fcdb2-1bde-44a1-bc74-0d612d6ee1dc",
"relationship--01bfc442-0466-40ae-be21-50eda405d3bf",
"relationship--fa6a42c3-418d-4902-9159-cc91ed80a9f8",
"relationship--ca2d1451-f91e-4f88-8ac2-68d21de617ad",
"relationship--ae8ed46e-963c-43d4-8315-13261f70ac8e",
"relationship--6f38fccc-cb1b-49e3-bc39-dd476b24f28e",
"relationship--f1f1be8d-8b03-493a-9b59-94c5fcda73b0",
"relationship--d1aef29f-154e-4d56-9fce-6fc0d2e341a3",
"relationship--34c266fd-7271-4441-8fb7-6b4496a4161a",
"relationship--3c3d9f35-a8c2-4044-9127-526005175ca3",
"relationship--6512f4d6-b4f6-4955-b1b5-88a8ce820ab5",
"relationship--73913043-8782-41dd-a597-3e39d863b429",
"relationship--a540d70b-fe38-4c57-ad53-b41e681f9f43",
"relationship--0d1851f2-64e4-4634-845a-d93fd7b936ab",
"relationship--1a005c78-7e51-4650-afa2-5f5d5ffb02e0",
"relationship--b00fa890-a684-4419-be70-f74c8890ec4d",
"relationship--8b5062f4-fd84-4cf0-ad41-a0e11935eb73",
"relationship--6afcfcea-ed58-44b3-a942-05605391400f",
"relationship--234ccd8d-69dd-4d65-ac42-f7e1e377f169",
"relationship--731faf6f-c670-4177-8e39-0216d294445b",
"relationship--994d3d31-9e5a-4e9c-9b1c-d856f6c3971b",
"relationship--48a82eb2-af13-4257-95be-d6f1befb2b58",
"relationship--39b14fb8-043e-4f2d-b39c-b05e84d72814",
"relationship--f043c189-8d3d-4ac9-a8b8-e6f4a86a15eb",
"relationship--88eb20d2-434a-4150-9002-7706531c8bf1",
"relationship--1b6f4f0d-09be-4fbd-bcf7-f153581cc441",
"relationship--0163e7e9-c354-4528-90f9-b23565ecb115",
"relationship--6347422b-5234-4c92-a6f7-e55ff9d9b4e0",
"relationship--7f1512ec-2fe6-4ae0-aa38-0568a338fe75",
"relationship--607ef1c0-001c-44c0-bf10-9f1c7e5bcc15",
"relationship--8e15fa48-00bc-43c5-b65a-94f38bcfa5b6",
"relationship--5c40b6d1-711a-4e62-ac77-895bfcb1e363",
"relationship--22b92422-0572-465c-ba22-9c62f8748984",
"relationship--4f46ba2b-d560-476f-8b15-2f6579437c9a",
"relationship--09d4cf54-f9c3-4a9e-a147-748c1a05a041",
"relationship--4452d80d-64e1-415f-a572-7d7500b65c77",
"relationship--8c3e1539-10a3-4b4f-9582-a3b62af76f59",
"relationship--2361548e-dc27-4b3a-9a33-9196c1fd4843",
"relationship--7c6591b1-e61a-4082-bfd5-2f3c35c8bcbf",
"relationship--6c746fa8-c7d3-4d11-9635-c122d900d126",
"relationship--38023b01-4bdb-4825-a425-980dc8fd9ec0",
"relationship--c87666f1-e85f-4562-9b3a-68e2ac55f042",
"relationship--90aa0359-ab9f-4dfe-a819-08f29c953377",
"relationship--03ce1fe7-99ad-4bb4-8d7a-18e0bb3c7891",
"relationship--66e07e96-0d59-4f11-895c-9c4854f2bf89",
"relationship--573850a2-7645-4b5f-88d0-d63e629a4276",
"relationship--aea3ee34-414f-4a38-ae3e-a1693fe5c3b7",
"relationship--778c26b8-3494-4d92-b172-7b55109c9ba3",
"relationship--7e82e98a-29a6-450f-a363-7bfd15e2110d",
"relationship--3d9c7417-ec24-4c2d-83a1-8ed62b33b1f1",
"relationship--f77d45f3-3b78-4bf9-9555-bb0e1f4a9970",
"relationship--c41a783a-9a7c-4238-81b1-1ca69944170a",
"relationship--1d19a51c-2769-44bb-8982-b2a30e83510a",
"relationship--82a5fbc7-8c99-4a3a-8713-263c94504a04",
"relationship--c3263730-eca2-4e4e-98ef-83658837e216",
"relationship--527ba23a-7830-4eed-ad8b-ee9e9f81065d",
"relationship--ed36c100-95f7-46d8-bc92-d9fc75cf41b8",
"relationship--813ae0fb-bf41-492f-a243-6430812b15e5",
"relationship--b711937f-72b7-43df-8d8e-696b43f0b085",
"relationship--55f77580-c050-46ad-b1e5-c2c6765901e4",
"relationship--350e80a3-3499-4c24-a650-eefe6013cab3",
"relationship--aa784a77-e71e-4810-bd38-58d2fe4668ee",
"relationship--7e9eae16-7c26-40c9-a706-cf7f4b77a4d6",
"relationship--a503a6a5-336f-44be-9547-37410a00a281",
"relationship--10c9d47d-8483-4e0f-8d8e-297c8b8dccf6",
"relationship--04f4034e-c656-41e3-8d63-c10c3be41a7a",
"relationship--bc6e6e28-33e5-4b03-9088-3ead5fead327",
"relationship--77f761b8-28b5-44b0-9b7e-25244d3faf4d",
"relationship--ff8f3a24-f7b1-4034-8926-affb0ee718b6",
"relationship--cbfd7a58-9bba-4daa-ac19-875daa628569",
"relationship--e47fadbc-a438-45ec-8029-fbdf51582fc3",
"relationship--9a5d5fb0-ecc4-49a3-9a14-ef0c6552fd33",
"relationship--069821a7-6fb7-4278-8174-35f3971fea24",
"relationship--990581de-2fd6-4264-b0e7-46848b0680cd",
"relationship--e9cf0aec-5575-4b07-a582-0243d1233516",
"relationship--86b6944a-f724-43db-aaea-31be935313c3",
"relationship--39571453-e7ff-4979-84e1-cb777c95f601",
"relationship--d70ded63-a583-4bdb-bdfd-370ea78f2b22",
"relationship--0c45a513-c853-4e25-afeb-e945ff77c1d6",
"relationship--f4f47f65-ecb5-40bc-b4be-73fa5e06adfc",
"relationship--f4361f90-557b-474b-bbed-f3e3e86d0329",
"relationship--6086697e-0f78-4913-b7ae-2ff94e988339",
"relationship--280f7ea6-1e58-4918-a8ba-3a6d8196c7a2",
"relationship--9a237483-0892-4c8c-bd6a-338f2067cbc4",
"relationship--571b8662-c00d-469f-a1f0-733a026ab26d",
"relationship--e10cdfbd-6fbc-4447-99a1-79d728430a4d",
"relationship--a88408de-1342-4951-9e62-6e8c47faa391",
"relationship--9cc9a005-aaae-424e-aaea-564053496981",
"relationship--99570dd0-b83a-47fa-adbd-429f13a119a4",
"relationship--c373dae7-6bc8-45e1-895c-4f06d9970e08",
"relationship--9949c894-ae41-4d0c-bb5b-d8b4290c54f2",
"relationship--01781047-fcfe-4f56-9da8-28f238f96246",
"relationship--feb4b119-3f25-4f75-9dda-4a9be7a486b2",
"relationship--fa6206e8-c728-4004-8870-a8a1cc024778",
"relationship--e1a1fac5-1f5a-4d98-9620-f43e9af41e70",
"relationship--0e96cf62-4907-41cb-aabf-3731c6be242e",
"relationship--fd0ff24c-8549-4cd1-a486-30261b4c116d",
"relationship--a8470c28-966e-461c-b5d6-c5e1970200a6",
"relationship--a849ee4c-ea57-41dc-9ee5-de59f6bc013a",
"relationship--cc4f40c8-b4cd-49d7-9a15-30a8029f1fc0",
"relationship--8156b46f-8006-4b3f-9573-a277a643a65b",
"relationship--33077db2-fde2-4a18-ba7e-0b596c0e6093",
"relationship--0d82bb92-020b-499a-907e-2c74a9c038c4",
"relationship--acd5295e-0261-4651-9687-a79d72f8e591",
"relationship--9163b719-2c75-4f8f-86f8-ff73c34a59a0",
"relationship--86037b0b-ad85-4888-bc40-0c0f8b4e697c",
"relationship--7fb99ba5-e121-44cf-a036-f50dfbdb7837",
"relationship--3b567541-7758-470d-81ca-d8d6a5b7ec2e",
"relationship--0d2558c8-7c4e-43ad-89d7-7ca2b6c9f1a3",
"relationship--6fb3e839-fec0-4237-81a0-1b91cdd3dff1",
"relationship--1ebd10b2-1bc7-4c74-a87f-873ed166ecca",
"relationship--c305167a-399e-4f87-830e-2303ef52b2dc",
"relationship--fbbfdc2d-d0e2-49bf-91b7-4c13372df827",
"relationship--34b3980d-6320-444b-9183-de3fe2bcbbc3",
"relationship--c2a82ba3-e1d1-4c14-af57-4cacf070820d",
"relationship--ece69363-1a5e-4c84-a65a-b439ad3e27a5",
"relationship--76cecc97-eef0-4584-a12a-60936c4c4dcb",
"relationship--fa39bb20-3ed2-4c4f-8f42-713d9688dd15",
"relationship--ea101768-ddc1-4dfc-8734-d13dd8697dea",
"relationship--5fdcd87c-060e-4d9b-8041-48b04364c815",
"relationship--e841c6fb-8270-4270-a845-a863c1ff7c16",
"relationship--bffe8fc8-fdb4-452e-b05a-9d6a37d444e8",
"relationship--b77c852e-9ab2-431a-9ed5-7042983e8de7",
"relationship--5dbd4e0b-1f4b-4c45-9027-ad2d6c24734c"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"osint:source-type=\"blog-post\"",
"misp-galaxy:banker=\"Gozi ISFB\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5aa7b644-9558-4b2b-8deb-4e74950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:10.000Z",
"modified": "2018-03-13T13:32:10.000Z",
"first_observed": "2018-03-13T13:32:10Z",
"last_observed": "2018-03-13T13:32:10Z",
"number_observed": 1,
"object_refs": [
"url--5aa7b644-9558-4b2b-8deb-4e74950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5aa7b644-9558-4b2b-8deb-4e74950d210f",
"value": "https://blog.talosintelligence.com/2018/03/gozi-isfb-remains-active-in-2018.html"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5aa7b657-db9c-47d7-a90d-42cb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:11.000Z",
"modified": "2018-03-13T13:32:11.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years. Banking trojans are a type of malware that attackers leverage in an attempt to obtain banking credentials from customers of various financial institutions. The source code associated with Gozi ISFB has been leaked several times over the years, and the robust features available within the Gozi ISFB code base have since been integrated into additional malware, such as GozNym. Talos published detailed research about GozNym in a September 2016 blog post. Since then, Talos has been monitoring Gozi ISFB activity, and has discovered a series of campaigns over the past six month that have been making use of the elusive \"Dark Cloud\" botnet for distribution. In investigating the infrastructure associated with Dark Cloud, we identified a significant amount of malicious activity making use of this same infrastructure, including Gozi ISFB distribution, Nymaim command and control, and a variety of different spam campaigns and scam activity. Talos is publishing details related to ongoing Gozi ISFB activity, the Dark Cloud botnet, as well as the additional threats we have observed using this infrastructure over the past couple of years."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f870-49de-abd4-4dd9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '001c4d2a65dc725e1d616078834e32ef5f3f42c565165493de4997ea81451d30']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2404-442b-8b73-4f6e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '0084b71d5f3c558f05d887cd2843e6d15b77924144beb619e75e9be445d326c4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-76cc-45bc-aafa-4007950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '01b623a37359246c634d3a4fbb423fe8f23bc8921a6719be6b0b93cd0e071253']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-714c-4e23-a4bb-45f6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '02adb1fdee7b1306e2ba7a07a052b6d390d8e939c807b7b6515589312d072e79']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8148-4f2e-a8eb-4377950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '058f5a5091489fee86a000a55181e44d4acb5adc81bf709e506c972776cc76ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-826c-4e96-a3de-40ea950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '05e4dfeb72eb015cacc9f1040d205d7f5205a6d4d29eed5f1221ed1ef0a8061e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1c70-4076-b9fa-4863950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '076c6d0b22fb063e85d1ca6be08b9d5b202b2a543d7a9aa9a2f525acb3c8900b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1948-4b18-a208-49d1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '07c2f262f84c7013cb83f25027e86d308f6a7867cb777b978ddd78e999fab187']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-368c-4c37-b61d-4a93950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '07d9637fff6a7974be99206e6b767653e3ceef2bd91531afa300e1430b8eb800']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c3ac-411a-a6ab-4f86950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '08281fb7677a651351a9b0a1ad5c4dace6748104d210cf6f9aecce0935b31007']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-5518-4149-8a37-46bf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '0a7c4d325455d706c3f331b595c1261e78bf59ed0c0111365604203322b1e177']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-149c-45ef-87ab-4bd4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '0acc741c806c8c0bed64d14d6a9d69580ece212e6517ffced865c2be31bf72fd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b544-43d5-8a8d-40f7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '0accb1cd97ab92a9b4b8829a36e081ba8c5ab8944928d79502aff2f141dd999c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-80e4-4da8-b5c4-4045950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '0b2a23066f3601cfcc99b7555a552807946c3da8c0a8519f52b4175e72828c31']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-44b4-493d-8334-4127950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '0e3de5470c2f6687efee85eeb7022cd304b880118fdfc23eee8761ce3374635a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0244-4b14-8499-47f1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '0e8ed0237d187dc5de5406b46f248f090fa50035bdb927944853268e22c3016f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9cac-481a-8908-4b15950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '10e90d6fce4d5cf1c3f4a9e779547570986c948a7ed2d6cc824c279f73d0589a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4a38-48f4-8738-49aa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '11aa9301346258b1e950607dfdb37eabf874e93406c1454c9a4bc905d1ccf925']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-e054-4cc4-8229-4e39950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '11c09386ec4cc88136bf85bf2437a28e385d42fea053e95b3d6eb5995e0fabc3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7cb0-4347-927b-41db950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '123fcc8bc29c954002a10a992633d143f0496bf7b942bef6741aae761cc9667c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-07dc-4f64-bdf5-41a5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '12596ccb9a77db49e5dd8c2b38779cdea41f78660c8a0b9d0ccd80bef004b2b6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-a62c-43c4-aeff-4bb6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '125c1da1e9c3806a36d83676288e25226be564dd8ae941df4b3fb3f3a1fec31c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-66dc-4cec-b087-41eb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '134692b2f723e62bf9cb243e69bc7d4fc613ecccd02d44072e6097ebdf34ce8e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2020-4a5b-beda-4e9b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '1416ce19fb29b01b3e89752cd2470f9390fa76ddf6a2d54a6282e85bed7b4375']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d4b4-4c4a-95de-4121950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '15077e348ae73659d6421d206fa34055710689deeac1bb2d1c41d7a52adda610']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7df4-409a-bd84-48f8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '17cf8baece726646732d14c54c565bb27c941145d10803809ade30280634e24a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4de0-478b-b15a-4aac950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '18de35862022570015788dac8f5f60d47bbdf7922e5b75da278828eac1d9cafb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0ef4-452d-a826-47df950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '1e8d3218fc242a82f105bdd1af3e5e6cc6865be66241914d0d51b332c71298f4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d06c-4ecc-b6eb-4e2c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '1ecf353cee0116eed985085707c29ba7a006da2975863f31372b3bd6a0ab7974']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7560-41fb-9140-4984950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '1f14d6590c2f3434805d0967ba7bbb822ce7ec39a89b9b10f2a26d11176cc77a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-3610-4626-b558-47d4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '210397548a6178ea29fc4567328524b41592cfd60fe1a3db543ef49eb37f0a7d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-08b8-46c8-97d0-43ba950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '21474c9dc0a59c8b4a9bf9a63ce2642296c3a8bd571f013f4e0744098a46f7ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9a88-4012-ac17-413a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '25708004887ea068f449e989bbbec07282d14c3ddd8cd03b4af492143a03f397']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4b34-47cf-a040-4d5e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '258989c785d7b5d50cd4a9a5c2fc6b27ad84912c80c079c896db23bb64ac9772']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-e920-4a23-864b-44fd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '258e9ac0aff2d08496427b988d5f98234d3098329f116202ac1a1c9e5afd272a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-93f0-492f-99ed-40af950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '27804dda3c5bb183970cc7c38ef0ebce44be5f9f0ffeea4f224bc5b7fa91953c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-26ec-4ccf-86d9-4671950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '2811f5cd04ee2907fb8d00e88a40dd32d95fb2c8223ed490d578c44cda923608']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c7f8-4bcf-b395-4013950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '29970afb6fc25dfc761fd513bb29ae79cef090d4f667a54fd5c51b9835521c93']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6968-4622-a5f0-4764950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '29e66d89af2621339273b64b45014e661710361591c514b950092be82e5222ba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-06f0-40a4-8571-4d36950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '2be736311b9fde1539cd73b19eb742f6871e423216d66dab66e7914af52fec19']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c930-4b44-ad5c-4c5f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '2da98e19b1642bd55ea8365795f030789508cd88fbef81ce16877436ea2c1484']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-658c-480a-a11a-42ac950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '2dc8a22cdf1b5f9eedfd45cc7c1e224714fb9ceb7e06dc25b69efb9f45413b0a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-182c-4d0c-89c7-4d03950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '309d3a5549fe176866c18d11bbf03899cece1b666e9b28358daf9aba3efd2068']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-ab8c-4a40-9178-417b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '30ecdc16bf9d416a2729d20b1bc2da466e58512f501395484828ef3446a43686']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-66c4-45fa-85b3-409f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '30f185c47f29987917fda34fa979573f19269c70bfcb9457c6a1991a04953a40']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f6a0-4f95-80f1-4fe4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '316c77088d181a3dc4021ac2631fd1531f9a9602db70b90fe6901170ebe43c82']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9360-42ca-811d-4a7a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '31ac22dc5ed4f7245e3988d096ce8c78e8d8edb95ea83d419bfc5c0d6dcb8cfb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-5280-40cd-ae93-4305950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '3234c6726f375d48cd7274e1e2aca5163ec20b8344637f67990f2ce1df587c62']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-02c8-400a-8bad-4957950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '3235914dde70f5f23899489bee7880fc5c121e28442e0349dcb7e266f2aab595']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b5cc-4ae3-98d7-4776950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '32636046a3a6d97791d0a48ac59dca6c1ee3a030bdc33610c2bef1c726487b9a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-5354-4329-98a4-4780950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '32695d63215d0bd76887f1373b89607f6b73b193f37f044a518afe3db446bd65']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f1a4-4087-bea3-4ea4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '339db83eabcdaf0c4b922811e6f98b36a4d6dcccf7f03ac41e3455ca2701f754']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9c10-471d-9443-40ce950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '33a5975e9efb51377b2b5fec1b4313e87d4cef1a7858390e64ddcfc28e1267c7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4bf4-445f-b06a-4709950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '34a7e963ff82d073b6c2b2fda7bfbb9ecce9bb4e437be856252f14de6040b8ad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f6c4-4127-84d7-4481950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '34bf67c997bf5b450a13538ea540080a1c97fff1c7453d497acf28539cf82464']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-a900-45bb-8db5-43b5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '34f08e0d3d5f430e1a3b3604a9c5cb26850967b6f4468a5d1146f1681ef99dad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6564-4b4e-9457-4840950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '34f6bf5de0b379b5cc3218c3b81c23fa590ebbe4488d35fdb5ba241ce6d3811b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1228-4f85-b81a-4cca950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '35ef838fa56f2c30dd62cf97421e8d4c322d593992560f1631c68492a0d39150']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c658-499f-9c7f-4639950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '374595d82e93a01325099581517b4bd8f456cb7c1c651f1a3bf2c6b084e4f588']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-76a0-4f0b-852b-447a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '37ae9bf28a5761205b13fcd0c1d5790ee2f6685acbcbbbc18eaffd08f1879494']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-210c-4d26-9ba6-4f2e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '37da6dce2dd7ca03a502c53f0f8dec0c318184eefb694976bcc3aa6b5fa5a7de']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d730-4148-8525-4584950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '3903705c0e2eb3b9d6c289257aa515c987ed06eab3051c7c68369a4a64d93ecf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-86b0-4e44-9076-48e2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '3978407f6443e5396459bd2971b27cfbc5297aadec810bc0dc15f365a257b58d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2884-49e3-82ee-4a65950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '3c8336cc1d90a6bda731cd722bf83b41c7e67ea124db190cbee93f5e93f0aa29']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c288-4e9f-8b61-4dbb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '3f930936e2f69619c2f0894bb65b9336052d77c8149958afb391dcfdaaecdcde']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7e88-4de9-891a-49aa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '3faa0bf985680899b7ceeb5d9e8e502c1d65a113afd677d41b9f33447e46de83']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-20c0-4cb6-bfa1-40c5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '41de9e4c043450b3d2342836ed5f56217f1dd5161394d3d52811709c3584d44d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-a41c-4020-b632-489c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '41f8b418bd12776cd5bd154226d2646bb766bf3cfa95b41d03003386ada51789']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4d5c-4f2e-93b0-4093950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '428f8a7ea9ae3e8c52f06afce39aeb65468acceeba9c77ed8c84c740ec61b5b6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-df90-4f4f-9b4e-4a63950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '43119f84aab92fb79d14eab9e40bea78f0793ae323be7cce04130b65f2861b5e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-a4f0-4e81-8eec-4cca950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '43c45ca9b13fc4b0a5c80b896e219ff376eb49d2ab9d3e2ddaa7a2e743e97289']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4340-4791-aee9-4be1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '44f52e01e59940e2d22a7b6473a76fc8bf326c4981fa4dea0f63234e62e151ad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0bc0-45ba-8b52-4403950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '45fad51e141ab93a26df72010aab0c464da2979745b62066a5810e7b5dc370e1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d120-45d7-afb8-4446950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '4949af73035869e28552272ed9c79511027ef026cb79d065f0775b50e1e5008b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8bf4-4e5b-a767-43d0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '49580ca29529de4ac3ce037c6bf5b9c675a9f770c7ec4d1203ce19391e0661ea']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4218-4619-877d-4d3a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '49d2c6c0ab28cc428c3e0dba54027de788d65d635e21577172fce0670c31a3d5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-fbc0-4693-897d-4707950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '4e3570696f61c6fb49f9a5e4041c9552f84ad2954649f91e5e191457049e776d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-adfc-419d-8938-403a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '4e6f7d50b2c4616421f4e662eec927b9f60dbf720f0e3dea25d9177c56f329e4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-3be4-4505-b752-414b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '4f268fc02c92d31707c728858c295b61c1a199296001e90e7a40bf56ed7d9faf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f140-4cb8-ac2c-4f23950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '4f47e319f1ffda90d84a31c24f6eac04774cb49b0c5062614231515794df6ed7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8d38-4694-be68-425a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '4fbecaa6c190937aac19adc6ec5599a7056305ffebe65015e22da2a324c7c114']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7d90-4226-866c-4f3f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '504af6417f1d6f4307b046f70104d604b3762bacefb6f4eafedcc35a9fc7d35f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-52f4-4f1f-9b8b-4b42950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '50625750d4338ad1698b2216d0b289cee2666ac5ea081b90b11859ee13c92a78']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-3348-41fd-bcef-4281950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '510d7394bf01f4c836524d08cf7f35bdf15f304e4b7b8287d8759316b275e396']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-59ec-4d83-81a7-4c2e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '5112d0c215a4ab21157be3752b12c4a5dd663b20a0373f686e8a091341d3ac52']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9224-4151-bd6c-45ee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '514f5bf6c530f0baa7697e52dfc22c2199c378765d461c573b26ab9b0cfa71a1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d09c-431a-a9cd-4fcf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '515651cc16fe74451eee5d02ed357a2cf41c5f05ef81140620f1f472fb3043bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-06e0-47e9-a955-4398950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '519355607d92f31136d21b8ac11a2927e850de7b757af62c27e28de1ce4c1c44']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-3f18-4b5f-8034-4cff950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '54b8b75b4714b1902e0bd46dcc14877b6a329e88ef7068a2855710b39ea7d13d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1b84-42e5-9a18-4a08950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '56b7d25e2ac670add082a1f563e5b6c18ac60c0883e1ca8dd1d069f443c43679']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c208-4996-88e0-4f17950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '57fdd5ceac9957edf992b03fb4f888d2d90991d1d8148f55f57c466127ea2e67']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7700-482c-b0d8-47d7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '5abc641c6f48c2ef5e8886085e375cdda5ab5ea47b2f935c1060232e8795d030']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1de8-473c-b68f-4e87950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '5c40c4454fc289f9b240eb5419adce33b4b146753b5fb4404aaad4ca81ea24e6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-cb10-4724-b192-427b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '5cab554b4aa4864cce93e6853142cd361866fe37bb55e13711163ebee9286662']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7e78-4824-ad94-441b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '5e3b091d32b67cff249bb8667e12b6adb3c9f3315fa4d0e6e0af0924fa5306ff']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-35c8-49d2-ab37-49e6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '5e669d80d7dde5dad3b86547f4b9a89dde17a39470a929d829e84a90442d986d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-04ec-4be5-ac44-4875950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '5f0028ccf2b04dc60b8589a1f66dfe0dd066bd6ee5a6b6dd2cda57e42270ef54']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-a468-461c-a765-4c07950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '5f0ce2e522623fb51201212af72af0851f1a3b9c2f06cf74bb26d73eebb3fc14']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-48f8-4593-b032-4597950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '5f654112de0cafea313816ab3ef06818b438997b94fc28cb62474c17a3426f4c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-e6e4-4330-ba5e-45ff950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '60fe04943eb87375122a70d1672722e7700394c5d7427660bae1c44d902e2017']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9344-4470-ac4b-43ed950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '610e32c6dbf24f80c6a20648a139b06ee9ef255178feb8c788e29bced4016443']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2a8c-4b72-ae25-4ec5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '628460a30534d48bd4e09d9ed2e524eb30f15dda804618bef73b28f8e6a33eda']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d23c-450d-ac23-4b07950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '64a7fb913f2507a283917dbd3d22ec8335d0cb462e3d92711cd8396b3cf09edb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7e9c-4adb-b5cf-4aca950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '64f64e84b753992054214453ffc55f0b04f8e424d2b7610dc134c75f7da899ee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2520-468f-8dd7-4b88950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '65f4b673130e7858063199c89cf12a100484bd4f1588eedc01ea9c46e2d7e11e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-dc70-4aa9-aa01-4549950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '6667897650cba6e393345151f9b44e62bb5d1eb97888e4fb569d79d7fe89b873']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4f64-4203-9685-4875950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '6ab56fdc5593974aaea168539cdf70b33e0e18149a335d0762436f8d7cdec3ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d324-4d72-960c-482b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '6b5b633e0cf8ad1537f89e9783b2ce771b2097047af940856277d56a2b04bbcb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6170-481b-b9c1-4ad2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '6ea19ff6b921be796960f5c575f4021919d69172bc4fd848d70d65eb1fe23ea4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0024-473a-9229-4f4c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '6f3ad7b311f7f052accecf3a434418e499d3f2e7cd6374c15d8d26a3f1785c01']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9dac-41d9-a065-493c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '705876c51b6e6c32f3be3d54349c7892e3657535a02f28748d186aa4f3a710c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0b8c-4f2b-b3dd-45d4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '70dad100507788e071b1f3f8be7c2e97a245b277510dcdcf31db82b2f826edf9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9654-4488-a98d-4dbf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '73273151aa0dbe419d1564522a17d408d6b4fdf447571f323558b7e806e52d9d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4f98-4153-87cb-4ba4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '73c3d7970dea0238c98275f925f18d4f3a66237a6b270a2732cca31193612f90']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d998-4817-af13-43d0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '74072ce0ba259e107a7f6549eefbe241831b257af8fca9a834b2b7e9c1649791']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-92dc-4b7c-a3a9-4e94950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '741a68002907eb05a140dd4b1000b09f9ea9f0a9ccd6928e124db0e7c535b5bc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4964-4b03-b190-4a5d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '7726a78b870ceab360e0c044b7f6a10a61283c814de09e870e49187927bd71bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-deb8-4262-b433-40b9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '79905733dd082deeeb5dc87b9f394c3bbb06b3097cdb53e7ce8bc3c4b460809f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-70ec-4d5e-a17c-43c0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '79f9cb65e970ea7d4d6ad21a3ee13a7ba356aaf355d67c5a4e75495f8544a0d7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-251c-4484-8cad-4485950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '7a3cba962ba9a73dd99f68a0ab7c0fb77e3268005e6645827c0015d368acb0bf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-be58-47f9-878d-486d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '7ae9929902023ab4458ec482e9a5cb701e68862b2a1168fba6fa8b6a3e784866']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6540-4c46-82f0-4d16950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '7aeeb897d0c1de47500ea23b65a2266e7239f2b061ef4aa8989164a4e99e94bc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-e388-4170-aa6b-41a7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '7cbcb52a2d8de4b64ccc9b885e43e39823de8c327705abe45b8bcab2b17d548e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7300-4e41-9200-48bc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '7d1c32f8f47355218320a793c3f0f74c6fa7a19c22f7d01eee947f6960dfa466']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1218-4524-8f7d-4005950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '7dac5f0299bdc8a36df6ca4eac7a649754a8c706b7211108b26cb0eeb1d72a67']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b518-478d-aa5c-494b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '7e0ff14ecaa2ac825c2161e1e859b25e33cca421d32de1cc009863bd049e98e1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-5b38-45ff-8dbe-4ab4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '7e270f53bd36b34ef6f9e711b1943b582c95a7bac27263356e9d97273a3dbabe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-fb18-4c6e-8ae7-4d8f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '7ec64290f1e946d9d0c20a03d9319f92e401ced19e0efe0d8770db75cad67278']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7708-4cc2-b7b9-4057950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '82903f14bcd5821f6b0f2682b1e0d32c77c760812b23811da0f1a3003917037a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1a6c-4d06-b495-431e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '84639a788cc03eb09efb7c1b60883c37e5ac06eff0bff6d38022d64bf56f2330']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8a40-4411-ad8e-457a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '8587dda211ef94435a1ef9f1c4c299afacc179fd59fe06c74d3e75506d084277']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0f2c-4df5-8dde-4cf7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '85962b40ad53bbcb04bc9536bbab5244142b6239f972cfffd43d3c6f7956849c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-898c-4a7a-8b78-400f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '8599d1ce8abd86248f214f44a87cccf8e428c59451db3f8f09606c3d15d99d74']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0900-4552-9ef3-471a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '862432919f8db0049b9a3d59a3511898ad9bc220c0c64ac4a4cb97caff745326']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8748-499b-94b6-4c18950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '86430ccbafcd1cc2282084bd416592756765d744cb6b78b6aedbb7de27da9ec3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-29e4-4bab-b903-4a4c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '8697c6d9c186cbbab22974817f957fb41cb8b288667e7c38c6df981cb3386f5d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-a4a8-42dc-b522-40a8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '869d9b7e5f9f9c79e33e359c131639b870aaf6e673ffe6b05ae57f4de3bee7c1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4bf4-4765-b725-4d3a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '87ae0ce6d13939d0f048889d02da0f7faecd7707705b05b387b8e2cffaea5312']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4548-4c1f-80d7-432d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '8911699cdd4ced8731dd4b0f5269f52073acab270bad78aa4d161aaa673e63f9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c458-48cd-85b2-4cfe950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '8a02499298a1d12223a751a288092e6f196957e84179b91cfebb6093ac15fd54']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-59ac-4841-a55e-45ca950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '8d0aae0b927fcf6e3162d95b1038fac8281432f4f94fc294472ad3d7d1457929']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-e3ac-46fe-a8e7-4200950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '8d3b61d3137f802673644ecb3f673128df1afea1b96926283bb007b7dd681602']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-770c-4027-a091-4f65950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '8d74ae7b6a50c748ded262a822aa429a65666b965862ff2f4edafcd3a6f622d8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2560-4b98-a78d-4145950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '8f4533d820eb7f55e55c9ddff65cb629b0bdbe97d0f14d25d5d820acd18938af']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b6cc-40fa-9f5a-47c3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '901354b147cba30d916c0dc57a74fd24cfb44c20bcbe950aaff3e32856ea220e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4e78-43cd-bd3e-4d54950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9032651ccf32fa0acad949d32bacd2220582ac13c364033641413457dbb3b3b9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b6e0-410c-94b4-44a7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '903b1d2fc5f0fd013506915bf31dccf18f96a12efbfa89fa0f27410b98197518']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-290c-4434-9b8b-4328950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '904285c01b8b7fda39b5ffdad48101a2fb3c2ea82bc47d480383bf11ce926c7c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9c64-4320-b308-4873950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9094ab3ff3c91dfe6228bf3d225433b16442047fa63ed5e00f15dffc5676dac6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d2a8-48f0-ad1c-4722950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '90ca9d15eb5815f8b3302fc35c8c67fc7481198a1c91eb3970799fc3782eba6b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c42c-42d4-938b-4eea950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '90d3cad13e03fa3a586c84deacd68bf6ae37f60ea030d1efaea5fbacc1a1e93f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-866c-45d2-bde5-405c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '91f122e42535165233ef5657279eadcc15bd90e723a13fb1b51ab9096b6e582d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4e88-4725-81c3-4e42950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '92121041f5102caa8e0d95a48c32161648fe54c0f839ec54c8faf1595b0ea3d3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2b58-482e-9fde-4e61950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9248bf0411d30d4f1616f3a2d7a055b4692c87717033a36ab630ba20ff599489']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-eec4-4dd8-8db2-467b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9371809d87c41170ba8bfab3241f5b31d664035c9a249ba6541ff9cd57cb374e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c2fc-435a-a186-4bbf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9511cf49008d992c336dd4e0d944a307043f9ce47fa0323a04585145ea18c0cc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6ef8-4d1e-8f32-49ab950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '956c3c0a8b57b2322cc7269e08c0ecab13772093b964f6637a28f26c087f2783']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0514-4fee-bf75-4108950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '97d6ad9fc1758ed1312135fb283acdbfe4c8af484ad84be035886d630b5b488b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b2a0-4437-9269-4361950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '98861a1dd370bcfee107017e75cf1d527fbe8845181042de3493d0d0e7a624ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4a4c-4bca-8b06-4d88950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9894ba3b6c110bcd9b245058f8cdd8943cb7515b53cabe7589368de005cfcbd7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-ddac-4c47-a376-4ee6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9a16fe595e5e8dbe0604fa4d307250e4f47a86e7793378b5df7b16891ff21bb1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-84f8-41bd-b764-4c25950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9ab27bf6a30dd835d19c438bee3feeede1749c0ba9ef42fd601830f3950beab6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1920-4bcc-b945-41ae950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9b48f0818738ddda0adce3560770e8618dac6bd341d5e116d967562146d51a7f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-93e4-4947-99a5-4bea950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9daa9be7e3d45f1a04476c969a8f73362bdd960ae3b5b5bf02ca01c958ac1db7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1fd8-44de-b5ed-4e96950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '9e0ec586bb991db7b41440e6ab3988f7b379c17e7a8963e8f41ab153960b5b24']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-ba40-42e6-89ae-425d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a0cf68c10d1d9ce0e73208e6e6bad32b2405d2c74c662dc7b20f9b567c4dda64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4e04-40e4-ae9f-4a14950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a3d86b86f08def93a12afbbcb1748d60859277c3515c2fbf211a1e0d9cf0998d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d9f8-4bd7-ae5a-4e27950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a51dbcb87d67fc1edb0be26d35a632140383b47d2ba16c053825b551cf152f3d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7014-478a-a6d0-4862950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a52192465084e717ab601dda5a7d7f55530bdc206c84f634cc12467aede8c6c8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-fcd0-44a2-85ad-4790950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a5c8ec7e44ca6bdbb20f1234df90d2937372f629f9c0d39d5f4eac0c8e716653']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8ab8-45a9-8e38-4331950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a65093c35d1647563f840e42893d09809311f34c3861c2c9db479109ee31df37']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0d4c-46e7-aeaf-4b1c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a6a8117150a1bcb6ec16b6c002a341ab54a912190421cb404d147438bf39474a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9bfc-4e2e-aa1a-4548950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a7b9ddd84fc86c1eb09feba86b773961cc1d459287eae364bbe750533ac5ceb9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-3344-4bbb-937a-43a9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a9992d6d8a97f54e2b08ac58e0a50bacc6307033a91315e3ff1bc0a531b3876d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c258-4cc5-9832-4006950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ab0f7d145f178f26444e9c5b1815911131a7f6ba4b41647280320a363e626b1a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-57ac-41e7-a3ff-4614950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ad2cddbefebafe1b676c5429ce39ab46cb7cb947fa7f4ce4437e2bf8dc177cb5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-e148-463c-9894-4aee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ad5c791ae004cbb1aea0a71fe2f8bc014cba005e8a20e16042dd4f41169dede0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9e74-45d1-b7ff-4bc3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ae80eba1667456db827400aee3639bc03380ce4dec806c4c1b0485ce96b99bae']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-3364-45d6-bff0-4e39950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ae81c89e16a9e3fbff5b2054441c090afdf659470127b79f9662a5a12732049c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c91c-4110-8559-4be2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'aeb1e902075da6dc2d2526751276cc6602c819bbea2e668e9dc3baaf9d177adc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7b58-428b-ac68-49ec950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b044fd1e0ae000eeb04d0529b3920a38f839e910bfb6bb9d0837da22f0ace15e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1fe8-436b-86c4-4df9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b0e2cef91b30ab96b6893659537a44986767272dfc2438af8281455af0f892e0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c8c4-4b2d-a50f-4efa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b16db20a9a2e19b318d0ecfd8e9253e16499d8498156bcad684c39a9b3c37c4e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-5b5c-403d-8d2b-4f05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b1f2c4c3e837e4971a0cb2db3763e8785b0c34a65c073a890963b35ead55eff0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f880-4cbe-a2dc-4366950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b221d49022a39106207a6630db8a135d1803178b9d7e536525979c578184f752']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b2f0-4cb9-9e81-4cc4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b2b0fe8835f5cb0a941b876b48d7fda262b85b6fec15436e48fdd2003ed914d4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6f54-4307-8757-400d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b3dbbe79bdbf9e6d6a8eb1bcc9350f847b76aaf304bc981dca9fdf281ba22360']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-15d8-44d3-973a-4bff950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b41c8eb7d5907d0a13d03163cbb4114a2983c4dc00237aab00f1a632725c27a6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-a5b4-426c-bee2-434e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b4898ad9f1757bd6f127fd9a539f393004654608037ba94b3a62a81166fd1163']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4274-400d-9538-4ccd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b4b6baca1104b0dbb289731c3b206cfeaefe58a23f45182e0d4f44069a7f5f39']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-da20-4a47-97a8-42c7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b4e43c40405579f7e508e5d546975b4b2bff83a70d7dfe98fa64dc407894d103']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6678-498e-a7ec-49fe950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b5a71e35a190c091720e643f0dedc09c07cd481f11cfb23866f2adecff8728be']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f078-4f03-bd9f-419c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b67584f6baec97528656dfbff7749f7eb355497706359db0c4bd981c15b3e854']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8180-4bca-8961-49e5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b6cb8872c9c836932cc4d9fa84c217f8cdd2e840d5f1f34441d572aaccf6c844']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1d78-41c9-9040-4eb3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b7fe03048f861222f9a161369e5eb38f67b13eb0de4050be089b394c7f30c593']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-a32c-4cd7-9a9d-492a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b82fd4927cc9347513227a8b8d0a206a4678461b16c3acb5f6add2e5d1f089dd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2fe8-43e6-834e-4af1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b84cac469c097e1296c00029f8ffb1b7e12fb791d10da6e01485079a7750958c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b470-49d3-8e5a-4350950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b930d8c294a10f76e7dc9fbe1b257142fa5abc4bea0bc51ef544117b4ad51e29']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-42bc-4775-893d-4fc7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'b964569f2697dcb72fd36076744995eec99a35f056826b6aab2c929e908d48ba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-cc58-4f5b-9987-42ac950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'baf336f2048ed4de6b342d4cdf8b6ca4a95cf83167c2f2c044c12fd85923ed87']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4cf8-4ff1-a660-4271950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'baf4586c1fcdc32fa2ac1441df17591aa34f54d842ad596abd2cadfc190f02e9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-ce60-4e35-ad65-44b3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'bafb6b31625dac34208b40dfbd0d61632a0096e8eac5220e80c4b8225fcb5b61']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6800-4a6e-8df0-43d5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'bb06ec141b6382a111c20c70898b161f2287dda44a7024b949cc91fab1d3ca62']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-e7d8-4cdd-8926-471b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'bb4eeb211e54b55d35f7b46ab85420e2ed033c0594f906aef7495430d30bb7f7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8434-44f4-9140-47ef950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'bcdefbeb609a3d839518b3fe9d77b138e4b8a7f3208e963650a5a2aac6373e25']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0d6c-4d1f-857d-4192950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'bd7138482a831b4a81150dda541b2375a10796dd365e5af441caabeea42bf455']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9320-4dc8-9881-417d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'be5e420236c341bac83cdcfe4e3ec58ac9b32ca2c36af1596bf0e3642ab29d1c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0fd8-4901-b8bc-4743950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'bf490a1a63c7e23b4afbe9140955b587457fef2c281c38defd8cde2c76c6f65b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-af54-4fd5-8f44-4755950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'c0296ba94b4445a4e3be227a31d3ccba011ebb358e93224a5141f53e9f6ec832']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4cdc-4c75-85a4-4819950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'c068b9246a31d99b810b253b7e92695108bcf27d253de4e4ac0aed3ab02e83ab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-fb30-41c1-917c-499f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'c097751002442abbcb8c85e5df07d64fae35c03789a4dfe364ffd3b5496891b4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9ca0-458f-8aab-466e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'c0e4aa6f57baae774b036bb5f9e9dd70a069d5ef03164c4b5e2a5825846b365e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-46a8-4640-9263-4e1a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'c1c6df93b8a8be0778e11214954017d9bf9971e30bef80a4c2031aadb2c63e3b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-eebc-4b0a-9342-4791950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'c273a69f39e66cf687f1d9089e7c21191f265c34c0dded99cefea57df8509c24']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8f64-4c18-8a30-4c7e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'c39babff09e33d20d0d24c0ff68810aa593a22fd53f5da287991a7373446a8da']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-3a34-4048-a73a-4f60950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'c4313ab89c3d94ab70185df327c664379490b263d47057543a5d7ab40e2ee588']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-ddfc-4991-a1da-4137950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ca9d11fb8b3919443e066d8e91587c34191c3b273a0f884c48084df77263de55']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6d74-4b8f-a4cc-4c1f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'caec6bb70c5c1ba33b2c0981e39b335177b3a31d9fedfd23e4c8194abdb3d6f1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f0d0-44aa-8e51-4dc5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'cc3ceb50174349d9346cee8c330b9d172c8260a7a98d38de34c5322cce53c31b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6874-487d-b518-4dcb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'cce6c0a11c9c10efbe0b7b6f5d8ca6150886188dc748c1d372358bd4e62cc720']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0dcc-4a16-9418-4aa8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'cdd034e8c27dcaf9baad53fa038b5931f2aeb4f313980fd99b5eb7d615df3458']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-a514-4ef9-b6e6-42e5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ce53701bddcc24071c55b2b02c79508276b3c69444275f994c0fe690c63b8df8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7d34-4276-9a9e-4def950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'cecc04094781c3d8440f54999d5b69e4ab7f4f2a3a0d6e85878ca60c0cafa34c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b1e8-471f-b8e0-4e24950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'cee3b79780438aadc98ea5b4229b754566430516e2792cc7d048fc472c4dbc79']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-e638-4df9-8eb4-48b2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'cfd3c017a7e9a7a1a1e47a60bdbfde167899caae9da81e5854994a851d9927f4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0f98-442a-8de5-4910950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'cfde9188f77427c56c541fba1ff15249dbdf2baf3f466367ba72a5c9a70b0d80']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-412c-4af1-b8a0-4f85950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd00bdf9012c8e83fd4e7f6ddb9dee9167db6297151d48fd9ea660a6ae52239cc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6514-4125-a3b8-407e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd10f6ae7735ec1767efb756a14aa8f45d3d0b926787eb6e682ae85a4f2e5f5af']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-5440-4413-a621-44c2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd11b980ada1634b17462c05c4f2ade8894f2267b254038aa27fddbf2e2f4c850']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f934-4871-9673-4e93950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd1509de315be40dac5807a016fd4c843abda063012d29732720db7087bb73f1b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7d58-43f4-87a2-49c8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd156e14065b5293a5511a027e6943399b3450a6b3ff74c50e31b3b7f4a1153f1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-175c-4ad1-a528-4722950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd158c1111de1b21a41af1099e0718ecda240a42636a5456ce2074f3ee6f7ba9a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c164-400b-b5c6-4aec950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd1f29d6ffb069c12670a264bf12a7ad4fc1c159b7f6aa61c97cd90d44289eec3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6978-490a-b2a6-45f2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd2b3946be545c3da30e779f60e73db1796073d6ca5ebef49a7cea7a75169cabf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-13e4-4613-a8f3-476d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd3f79eb90bfeccb507f69989ed38e32fddd7108660c92313260a64c798fe0167']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c300-4296-8ac2-480f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd4e793361db4e58aaf534f93b57e4ae5e2e53583caebede11522cb757e29696c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6600-46b2-966a-43e4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd69a55c55cf4c831579defdc8ae640997141c577558adc07fe53d037008541e3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0a90-4d0c-8a92-404f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd7841ad990416b6c46e98331ca6ca133be96dd1c463407f1b0e4bc759b002cfa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b434-4010-a94b-48b1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd8f73e616842ea745a15959c217dd383dd41cd0f706035759d40e5ea1ffdacce']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-56d0-4a93-a3a4-4ef7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd942f42f13aebdeff0f6d2ad02ba0d86d7ef7bfb070fec0e32e0aa8851032e9d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f0d4-4d5d-bebb-4b80950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'dc8c82e7dd88d9d42f2872fee149eb219b537c2f21035834bed17cd205f54a51']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8ccc-43bf-81b0-43d7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'dcf687e47e3ff38a34ab94cf0651e6a45a7d63ee4c7668bfbe3ebc375da3d7ba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-3418-4fef-ab5e-4221950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'dee5e465fc4959e019cc6e781d4be278997c34a0465fa36825339e12068119c5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d268-4960-8b2b-4f87950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e08f1f54620bafe44200b3e12177e6a934e2d27910125144aec9606b68d44a88']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-888c-4bb9-9a84-461f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e15200f16ce6d15b4405184bd6fb3889731ba3de306844f76913113e26146cf2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-28d0-41d8-98a2-4883950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e192c87072de321abd224a30c571207d986b882ec662da9c4ddf1b83d407eaa7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-db70-4309-9090-4ac3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e1b34078b5aab799cb78e7103286817a740da430fd1f107bfd4a673dce8fa9fc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-7768-4b41-a8cc-41b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e31f26fbb1265cef7403c4204fe2d47cf27617a6f9e166b2416cbffdafe34a28']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1810-43d7-8640-4256950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e43c2070435f9aa704408a6e4f9112b2e83288039bf8382023c3973956c670ac']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c664-42d9-af12-4914950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e4d735594547dc26fbb13846676cdaf387120da23756b4d5ae563da8a7609f3a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-70d0-4408-b5aa-4938950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e7d93e7f5cf85d8daa275fe73346930fe70233d553bd1d509cb7c2008abd3c7e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1c68-493e-b802-4674950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e985205932309edce7ea1130d1a3ba169a8b9b5a84c890e01633e45aa7b76e0e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c0f8-4ad3-94a3-4b01950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e9c24d0a80b622749a1b30f9d384a7cdd844310dbd3054898ec322cfabb65280']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-5f48-4635-84c3-441f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e9f64d3adddf546b49d2281519c8ada60cfbb3abd6b66a6ba25992cd6627ad26']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-fd98-462d-9fb7-4170950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e9fe7ebd22877358cc0f02c233faeaf4c40cf057a3c9fe5ba0a53ff3d9765f4b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-9418-4e6b-aa63-4205950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'eafc44e91530127b5ac46763dc14015963b77c2c52846ec7da42c50ecbaabb54']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-1e7c-4378-95ad-4274950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ebed0b54c50962470c7e541ea3874b6ccf71812540edff4a06080f978900d840']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b3d0-4bc4-974e-43d2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ebf4d1f9396d6ab1aff5b3cc6c8e682e1291c49bbbe51ac5c797dc252833909f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-f5f0-4a5b-a25e-4604950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ebf4d1f9396d6ab1aff5b3cc6c8e682e1291c49bbbe51ac5c797dc252833909f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4280-4041-9376-4768950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ec58ed473d3c8fc3d6f4430930359436771de9291d58b30d67b333ef01d59dba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-de14-4e64-b677-4d97950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ec58ed473d3c8fc3d6f4430930359436771de9291d58b30d67b333ef01d59dba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-ca8c-45b9-905d-4975950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ecb914fcb7ac970616768bf7ec7c8fdb27512fe0d1ae00980e6070b1226d95bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-67b0-49a0-8b59-40c0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ecb914fcb7ac970616768bf7ec7c8fdb27512fe0d1ae00980e6070b1226d95bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-561c-4125-9cbc-48cc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ecfeced9d622807d2b82b64fc2ba725603f9116f41e1ddb58715e1f751bbebb9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-ec9c-47ae-ae64-48c5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ecfeced9d622807d2b82b64fc2ba725603f9116f41e1ddb58715e1f751bbebb9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d464-413b-9828-498d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ed16e269224b7daeb5fb8aa5194543c3b300d5e9e916f1c00e268747c676247c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-6f94-4af2-83ef-4778950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ed16e269224b7daeb5fb8aa5194543c3b300d5e9e916f1c00e268747c676247c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4ec4-41e6-9474-4103950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ed43f1d983feb172fcf4b62956428ab6b4410a4cddbc6f02657f00dce2fc3a1c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-f41c-4f5a-9e3f-4e78950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ed43f1d983feb172fcf4b62956428ab6b4410a4cddbc6f02657f00dce2fc3a1c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-eb20-4a0d-ae3f-4aa9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ed99eea02491a4c659a54cb39f368b7c4713cbc6ef9677f169c1cb09f533bd6d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-8010-4aaf-a177-4864950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ed99eea02491a4c659a54cb39f368b7c4713cbc6ef9677f169c1cb09f533bd6d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-6e18-4a1c-8398-4db8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'eeb435abd819f5ec850aba835f52125beba9d45e3d86ac0000eafc27f9844dc8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-04fc-4910-9db4-415e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'eeb435abd819f5ec850aba835f52125beba9d45e3d86ac0000eafc27f9844dc8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-0114-47b8-a84f-468a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'eecfcd71ce7ec89f8d1b642c80106db2ccae5721bf88148031ce077a93172068']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-985c-4521-8f56-442f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'eecfcd71ce7ec89f8d1b642c80106db2ccae5721bf88148031ce077a93172068']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b030-482d-a75c-469b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f010103d51638b98c985abdab4fe9deaeb850bf924f93b53c9084da8ce927f5b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-3cec-477e-b08d-4aae950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f010103d51638b98c985abdab4fe9deaeb850bf924f93b53c9084da8ce927f5b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-5394-46f3-9a7e-4c75950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f03677848e924269e0c8f357ad56e96fb7d0875b6aef434779594e5fbeacb2aa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-c2a0-41dd-bd3a-43c5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f03677848e924269e0c8f357ad56e96fb7d0875b6aef434779594e5fbeacb2aa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-f824-498f-91b0-4974950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f0b78cf8d5df4c9873ecd7750eb6b49d565097ca59e8592b07a2e748fda1ab2d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-5344-4075-a623-4de1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f0b78cf8d5df4c9873ecd7750eb6b49d565097ca59e8592b07a2e748fda1ab2d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-8cb0-4863-9f15-4b24950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f11b7237907275ca59ce4f0b630f69a6c3770b0060359917bf465690e2309e47']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-e064-43a6-929e-4be9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f11b7237907275ca59ce4f0b630f69a6c3770b0060359917bf465690e2309e47']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2d58-44ea-98f4-4919950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f23d4daa59e771990a4ed13100d5a39454c89e3c01ccfb6bfa9b3257dcd51b13']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-6ac8-4920-83a5-406e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f23d4daa59e771990a4ed13100d5a39454c89e3c01ccfb6bfa9b3257dcd51b13']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-c9b4-436b-b862-4387950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f2e0902e21abde220813e7a4ea68c7b6039e92cecf338a522739e0d03bbbca16']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-eeec-4109-9ab8-41e8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f2e0902e21abde220813e7a4ea68c7b6039e92cecf338a522739e0d03bbbca16']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-3348-4924-8d98-4450950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f323778fbfaca654f6b91124c60d81bc3fba360ff96d30f0253293760ae504a0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-5d30-46db-a952-4e87950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f323778fbfaca654f6b91124c60d81bc3fba360ff96d30f0253293760ae504a0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-ac7c-46d9-9a2f-49de950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f47750218afdebc37ae9462356dd5a1209a238e4228dd10001641211b91862ac']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-de98-4e28-b9da-45de950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f47750218afdebc37ae9462356dd5a1209a238e4228dd10001641211b91862ac']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2e48-4582-8c25-4643950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f4b997725f499272c992b611b85db6b23f5b147319c0db0f093550178cbc1a17']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-50c4-4315-bbf0-46d3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f4b997725f499272c992b611b85db6b23f5b147319c0db0f093550178cbc1a17']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b26c-482c-b3ff-4648950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f584ec598c2926ecd0ee48c84a0a4e6d780de993281f390f6f93f014649fd2f2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-dde4-4cca-97c2-4bd9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f584ec598c2926ecd0ee48c84a0a4e6d780de993281f390f6f93f014649fd2f2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-2b3c-4cf7-8610-4600950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f6546f3a9fb403743f9ab72ed5c8e9cc63f26bc65f4fbd7139e4adbb12e854b8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-4c28-41da-a411-4b3d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f6546f3a9fb403743f9ab72ed5c8e9cc63f26bc65f4fbd7139e4adbb12e854b8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-b604-4467-8f7f-4935950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f703df08f5e7388f4873137977cf1c96a24293a7bf93b952c586c27b34e4212e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-e884-474d-aad9-4c71950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f703df08f5e7388f4873137977cf1c96a24293a7bf93b952c586c27b34e4212e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-4324-4a47-a067-4d4b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f7854d717ea3449b6cf2ed56b8fc1e790dff23df19c62e554f233300faac8750']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-77fc-431f-8d88-4d1b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f7854d717ea3449b6cf2ed56b8fc1e790dff23df19c62e554f233300faac8750']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-ceb4-47c8-b501-4927950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f7dd9c3111f0e0ed831ecf858f98a95389818378526a5c69e0cfea1977638d0a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-04b8-4708-861a-4a77950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f7dd9c3111f0e0ed831ecf858f98a95389818378526a5c69e0cfea1977638d0a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-53a0-43b7-b282-4456950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f82333a95a38167b554da0a6d2da54b19a0c633e6d8aa3a3a47c98a3fee304ab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-91d8-41ea-942f-48e0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f82333a95a38167b554da0a6d2da54b19a0c633e6d8aa3a3a47c98a3fee304ab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6ea-d184-4edc-bc54-427e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f85cdff7982cdd06bfd1deea928678ebc6d83625a2f5090f094153312e914849']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-10e8-4ace-b02c-4cda950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f85cdff7982cdd06bfd1deea928678ebc6d83625a2f5090f094153312e914849']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-7a20-4dc1-ad0c-40f7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f8af90b820a1e6b052ce62d9f8446457f74a4542c6d6f6eec354b895982502b1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-8314-46ee-96be-4760950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f8af90b820a1e6b052ce62d9f8446457f74a4542c6d6f6eec354b895982502b1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-f930-403c-a562-4d54950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:58.000Z",
"modified": "2018-03-13T11:32:58.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f974b1b74f862028f1335b15ed98d1388cdc770b6770aac9b7cc62847d9dad32']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-0864-4818-8f52-4e56950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f974b1b74f862028f1335b15ed98d1388cdc770b6770aac9b7cc62847d9dad32']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-73f4-404b-86ed-4053950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f97576b901e8daaac28370cbbc31ed48b98cea84b64a7d83c1fc2c805bf0c672']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-9584-450f-b687-4ba9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'f97576b901e8daaac28370cbbc31ed48b98cea84b64a7d83c1fc2c805bf0c672']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-f2a0-4594-acf7-43ba950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'fa9beaf7e8eb887f46ed584d2bb5b79f3c0fe5d57d6a5aecbdc7f6093c316eb8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-281c-4ddf-961a-4e9d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'fa9beaf7e8eb887f46ed584d2bb5b79f3c0fe5d57d6a5aecbdc7f6093c316eb8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-8218-427b-8733-486c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'fb74870bd4441e5933712c79804c3d9aeb0ba86162295990183abe8daa235c3d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-b604-43a1-ac6c-4e2a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'fb74870bd4441e5933712c79804c3d9aeb0ba86162295990183abe8daa235c3d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-1ce4-434a-849e-4b31950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'fc88d645f9885abf4274e7ed18e555447da13ef2c88082fdf904c3b869ab2854']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-4770-4213-80a4-45d2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'fc88d645f9885abf4274e7ed18e555447da13ef2c88082fdf904c3b869ab2854']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-ad88-42e9-ab32-4368950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'fe18a882867fd6725bc5c3afc0f8b7e9a81383d7c8baf30dec362c4eb2c95ccb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-b67c-44c4-8f6d-4a8f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'fe18a882867fd6725bc5c3afc0f8b7e9a81383d7c8baf30dec362c4eb2c95ccb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-46c4-4d3b-b79a-48d5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'fee25e7d024107c867f4ddbb61756bb02e935a8802813f5d8677b3ecc282759d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-2970-4f1e-befa-4e78950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'fee25e7d024107c867f4ddbb61756bb02e935a8802813f5d8677b3ecc282759d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-d5d8-4cc7-bd8b-4c05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-bec4-497d-96e8-451e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-5f10-439a-990a-4f6f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ff9785c05c08789800db47812c4e70ab892ecdba07189aa38fe0edbc4b87837d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-4a54-455d-bc42-47a4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ff9785c05c08789800db47812c4e70ab892ecdba07189aa38fe0edbc4b87837d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-c070-4c66-9d39-4b7b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ffd17e07e3b64207128b0b10f7b638c8bc97022f07b4410e7de28ad07650db09']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-e3f4-4320-9b52-4105950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'ffd17e07e3b64207128b0b10f7b638c8bc97022f07b4410e7de28ad07650db09']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-7c68-4f52-8c34-4baa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '423d6adbb47ce64e47944fe07bd22fd1a06e2332f5975b0da329394dcd7a5d3a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-33c8-4424-8c0a-4f3d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = '423d6adbb47ce64e47944fe07bd22fd1a06e2332f5975b0da329394dcd7a5d3a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-22ec-4f31-810e-4460950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a85ec8d623a497bd37efe216f8bd9e88ad24050949aacaf66461165ba09d5861']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-c534-41f8-b815-4331950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'a85ec8d623a497bd37efe216f8bd9e88ad24050949aacaf66461165ba09d5861']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-437c-48d7-8768-49b8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd5d0afc9b0697ddbf097e4704c0e4818b09a3f195b88f276b57f3e665352d7c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-c13c-4e64-aa23-4682950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'd5d0afc9b0697ddbf097e4704c0e4818b09a3f195b88f276b57f3e665352d7c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b759-5dfc-4d9b-936e-4bd3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:34:49.000Z",
"modified": "2018-03-13T11:34:49.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e112816a6380c8dd1c242ff911c2e59331615443fec86f5125e51ab10db1ad43']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b6eb-c3b8-4fd7-8a37-45ee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:32:59.000Z",
"modified": "2018-03-13T11:32:59.000Z",
"description": "Malicious Document",
"pattern": "[file:hashes.SHA256 = 'e112816a6380c8dd1c242ff911c2e59331615443fec86f5125e51ab10db1ad43']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-58b8-4baa-bf9a-4633950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:19.000Z",
"modified": "2018-03-13T13:32:19.000Z",
"pattern": "[domain-name:value = '22ll.ru']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-5270-4f42-8018-403f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:19.000Z",
"modified": "2018-03-13T13:32:19.000Z",
"pattern": "[domain-name:value = '22yy.ru']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-d2ac-4b6f-8a39-4ed4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:20.000Z",
"modified": "2018-03-13T13:32:20.000Z",
"pattern": "[domain-name:value = '2weqntuqwenwqeua.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-4ca8-482c-8b68-410a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:20.000Z",
"modified": "2018-03-13T13:32:20.000Z",
"pattern": "[domain-name:value = 'aandeegnaeany.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-e51c-4966-87f1-47b6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:21.000Z",
"modified": "2018-03-13T13:32:21.000Z",
"pattern": "[domain-name:value = 'aarisingyoulimitedbehalf.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-6170-4d46-a4fd-4fae950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:21.000Z",
"modified": "2018-03-13T13:32:21.000Z",
"pattern": "[domain-name:value = 'acquisitorv.megabulkmessage206.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-dd60-441a-b64a-4736950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:21.000Z",
"modified": "2018-03-13T13:32:21.000Z",
"pattern": "[domain-name:value = 'addendumtheshall.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-4e60-4edc-a3bc-44c9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:22.000Z",
"modified": "2018-03-13T13:32:22.000Z",
"pattern": "[domain-name:value = 'addrestartfokss.cc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-c2e4-4c81-95a9-492d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:22.000Z",
"modified": "2018-03-13T13:32:22.000Z",
"pattern": "[domain-name:value = 'adistributedmean.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-5450-40f2-ae74-4320950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:22.000Z",
"modified": "2018-03-13T13:32:22.000Z",
"pattern": "[domain-name:value = 'adojqnwdiqzxcqwdqwn.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-bb8c-4c29-89df-49f2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:23.000Z",
"modified": "2018-03-13T13:32:23.000Z",
"pattern": "[domain-name:value = 'afollincidincludesder.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-2264-4db3-ae6e-44bc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:23.000Z",
"modified": "2018-03-13T13:32:23.000Z",
"pattern": "[domain-name:value = 'afterattackp.garrashe.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8554-40c8-8af2-4bb0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:24.000Z",
"modified": "2018-03-13T13:32:24.000Z",
"pattern": "[domain-name:value = 'aiwdmduawdnjz.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-3538-4b67-bbf6-464f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:24.000Z",
"modified": "2018-03-13T13:32:24.000Z",
"pattern": "[domain-name:value = 'aiwjawnzjznawenes.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-58bc-455f-ae78-4f58950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:24.000Z",
"modified": "2018-03-13T13:32:24.000Z",
"pattern": "[domain-name:value = 'akeansynyaweomasny.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-3b68-4311-80f6-4971950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:25.000Z",
"modified": "2018-03-13T13:32:25.000Z",
"pattern": "[domain-name:value = 'akgheioahvnh.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-a7b8-46a2-ab13-4613950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:25.000Z",
"modified": "2018-03-13T13:32:25.000Z",
"pattern": "[domain-name:value = 'allconseqprojectincl.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-1b10-4f66-b76e-4fb5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:26.000Z",
"modified": "2018-03-13T13:32:26.000Z",
"pattern": "[domain-name:value = 'amnsiegkeaas.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8440-48a7-b027-4f93950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:26.000Z",
"modified": "2018-03-13T13:32:26.000Z",
"pattern": "[domain-name:value = 'amphibietyn.megabulkmessage226.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-fcac-473c-95aa-4bed950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:26.000Z",
"modified": "2018-03-13T13:32:26.000Z",
"pattern": "[domain-name:value = 'anaphaset.megabulkmessage219.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-6af0-401b-acec-40c7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:27.000Z",
"modified": "2018-03-13T13:32:27.000Z",
"pattern": "[domain-name:value = 'andfeatandlistusedpacthe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-cd18-4755-a2da-44f1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:27.000Z",
"modified": "2018-03-13T13:32:27.000Z",
"pattern": "[domain-name:value = 'andigermaster.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-3328-48ff-8d7b-4b96950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:27.000Z",
"modified": "2018-03-13T13:32:27.000Z",
"pattern": "[domain-name:value = 'andninformationfrom.ru']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-a3c4-4c09-b296-4735950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:28.000Z",
"modified": "2018-03-13T13:32:28.000Z",
"pattern": "[domain-name:value = 'andnmayphpsoftware.ru']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-09d4-4972-8b33-48d8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:28.000Z",
"modified": "2018-03-13T13:32:28.000Z",
"pattern": "[domain-name:value = 'aniymansngihynenrne.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-6d28-4331-a467-4e47950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:29.000Z",
"modified": "2018-03-13T13:32:29.000Z",
"pattern": "[domain-name:value = 'ansdijiqwiewc.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-49f8-498a-b20b-4404950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:29.000Z",
"modified": "2018-03-13T13:32:29.000Z",
"pattern": "[domain-name:value = 'anymonbunrybgakbweew.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-e43c-4dce-8721-4622950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:29.000Z",
"modified": "2018-03-13T13:32:29.000Z",
"pattern": "[domain-name:value = 'anytreeggnasneefor.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-7ee4-4f4c-82f7-41c6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:30.000Z",
"modified": "2018-03-13T13:32:30.000Z",
"pattern": "[domain-name:value = 'aobjcondigrantedfithe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-adbc-489b-8565-4bfc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:30.000Z",
"modified": "2018-03-13T13:32:30.000Z",
"pattern": "[domain-name:value = 'aodkqiwjdqwezxcmasdqynu.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-31e0-4418-85bd-4c3d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:30.000Z",
"modified": "2018-03-13T13:32:30.000Z",
"pattern": "[domain-name:value = 'aodwpzkgnbynvynr.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-ae34-49da-a051-433a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:31.000Z",
"modified": "2018-03-13T13:32:31.000Z",
"pattern": "[domain-name:value = 'apalicenseapachethisthe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-4f40-4d27-adaf-4f56950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:31.000Z",
"modified": "2018-03-13T13:32:31.000Z",
"pattern": "[domain-name:value = 'apjbqjasdqeeee.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-cacc-4f4a-865d-40b2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:32.000Z",
"modified": "2018-03-13T13:32:32.000Z",
"pattern": "[domain-name:value = 'aposdnbyenvgeb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-50e4-4530-a16b-486a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:32.000Z",
"modified": "2018-03-13T13:32:32.000Z",
"pattern": "[domain-name:value = 'aristocrato.white-messages-242.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-da80-4f4e-83bd-4450950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:32.000Z",
"modified": "2018-03-13T13:32:32.000Z",
"pattern": "[domain-name:value = 'armmasnmcznxqieqqty.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-6d18-4945-9013-49c4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:33.000Z",
"modified": "2018-03-13T13:32:33.000Z",
"pattern": "[domain-name:value = 'arnitorolgieetoneshutki.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-d648-49a1-a1b7-42e6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:33.000Z",
"modified": "2018-03-13T13:32:33.000Z",
"pattern": "[domain-name:value = 'arniytreegoogofastii.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-3230-4c30-aaea-419a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:34.000Z",
"modified": "2018-03-13T13:32:34.000Z",
"pattern": "[domain-name:value = 'asdljnoqwdnoqwdqwqwwqe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-9cf0-4d70-881c-4a90950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:34.000Z",
"modified": "2018-03-13T13:32:34.000Z",
"pattern": "[domain-name:value = 'augitesc.meet-girls.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-f748-4af9-bbb7-49e7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:34.000Z",
"modified": "2018-03-13T13:32:34.000Z",
"pattern": "[domain-name:value = 'autogamiess.bulkmessage-234.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-739c-4dee-a39a-4aa1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:35.000Z",
"modified": "2018-03-13T13:32:35.000Z",
"pattern": "[domain-name:value = 'awekzhktmwqqwe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-d8e4-43d4-b67f-4995950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:35.000Z",
"modified": "2018-03-13T13:32:35.000Z",
"pattern": "[domain-name:value = 'basisdirectconditionswo.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-52e0-4863-b0e9-4fe2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:35.000Z",
"modified": "2018-03-13T13:32:35.000Z",
"pattern": "[domain-name:value = 'bccxgddsiugjj.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-d768-4630-8e6d-4309950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:36.000Z",
"modified": "2018-03-13T13:32:36.000Z",
"pattern": "[domain-name:value = 'bemurmurn.meetlocals69.webcam']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-58d0-4e30-9b69-45a9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:36.000Z",
"modified": "2018-03-13T13:32:36.000Z",
"pattern": "[domain-name:value = 'benzoperoxidet.megabulkmessage232.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-bc88-4239-8b95-46b8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:37.000Z",
"modified": "2018-03-13T13:32:37.000Z",
"pattern": "[domain-name:value = 'bhembuvrkvhngg.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-27ac-43d4-9bfa-4316950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:37.000Z",
"modified": "2018-03-13T13:32:37.000Z",
"pattern": "[domain-name:value = 'bithedistributedlicense.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-7e80-4045-9459-404c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:37.000Z",
"modified": "2018-03-13T13:32:37.000Z",
"pattern": "[domain-name:value = 'blog.cvvshop.lv']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-d234-4bdb-9865-4f92950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:38.000Z",
"modified": "2018-03-13T13:32:38.000Z",
"pattern": "[domain-name:value = 'bnvmghfjdhrg.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-23f4-4227-a935-4bc2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:38.000Z",
"modified": "2018-03-13T13:32:38.000Z",
"pattern": "[domain-name:value = 'brontephobian.message-services-237.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8a04-4753-a29e-42fd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:39.000Z",
"modified": "2018-03-13T13:32:39.000Z",
"pattern": "[domain-name:value = 'calamodendronm.message-services-222.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-e970-495a-85cc-407e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:39.000Z",
"modified": "2018-03-13T13:32:39.000Z",
"pattern": "[domain-name:value = 'cancrume.message-services-240.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-4878-4cf4-b991-42df950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:39.000Z",
"modified": "2018-03-13T13:32:39.000Z",
"pattern": "[domain-name:value = 'caneventopensslthistheu.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-ac30-4cdf-968b-4bfd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:40.000Z",
"modified": "2018-03-13T13:32:40.000Z",
"pattern": "[domain-name:value = 'cbxndhsjeuwas.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-28e8-4fbc-ae5c-4c3f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:40.000Z",
"modified": "2018-03-13T13:32:40.000Z",
"pattern": "[domain-name:value = 'cdn.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-b0f4-4f6a-a583-47e9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:40.000Z",
"modified": "2018-03-13T13:32:40.000Z",
"pattern": "[domain-name:value = 'chazzenimc.megabulkmessage226.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-6bc8-413b-99b0-4779950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:41.000Z",
"modified": "2018-03-13T13:32:41.000Z",
"pattern": "[domain-name:value = 'choctawk.karmalsio.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-0888-4b8c-aa72-4235950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:41.000Z",
"modified": "2018-03-13T13:32:41.000Z",
"pattern": "[domain-name:value = 'churchmastert.googleboobs42.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-9224-45ca-9d2c-462b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:42.000Z",
"modified": "2018-03-13T13:32:42.000Z",
"pattern": "[domain-name:value = 'coniferf.message-services-232.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-1648-418f-9a9a-4d58950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:42.000Z",
"modified": "2018-03-13T13:32:42.000Z",
"pattern": "[domain-name:value = 'conseqcodepackage.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-9b34-422e-b7fe-4b62950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:42.000Z",
"modified": "2018-03-13T13:32:42.000Z",
"pattern": "[domain-name:value = 'continuatorh.googleboobs44.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-19e0-40e1-9213-4157950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:43.000Z",
"modified": "2018-03-13T13:32:43.000Z",
"pattern": "[domain-name:value = 'contributionsthroughy.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-639c-4300-bb85-4de6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:43.000Z",
"modified": "2018-03-13T13:32:43.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.19.130.150']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-a5d4-4a9c-ba00-4e67950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:43.000Z",
"modified": "2018-03-13T13:32:43.000Z",
"pattern": "[domain-name:value = 'contributorblists.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0cdc-45e4-930d-431a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:44.000Z",
"modified": "2018-03-13T13:32:44.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.244.248.94']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-33bc-49fe-bffd-42a0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:44.000Z",
"modified": "2018-03-13T13:32:44.000Z",
"pattern": "[domain-name:value = 'contsoftseeimpthpro.ru']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8480-43f7-be90-4c66950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:45.000Z",
"modified": "2018-03-13T13:32:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '103.5.125.204']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-bcf4-48c6-87df-4d88950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:45.000Z",
"modified": "2018-03-13T13:32:45.000Z",
"pattern": "[domain-name:value = 'cothenahudson.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f008-41c4-b61e-4040950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:45.000Z",
"modified": "2018-03-13T13:32:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '105.159.251.209']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-4438-4fa5-8551-4682950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:46.000Z",
"modified": "2018-03-13T13:32:46.000Z",
"pattern": "[domain-name:value = 'cotylophorousi.bestmessage-service83.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4e48-4efe-a46d-4e42950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:46.000Z",
"modified": "2018-03-13T13:32:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.102.5.159']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-db1c-431d-8932-4b44950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:47.000Z",
"modified": "2018-03-13T13:32:47.000Z",
"pattern": "[domain-name:value = 'crestfallennessx.white-messages-233.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8588-4e27-95a3-4e4f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:47.000Z",
"modified": "2018-03-13T13:32:47.000Z",
"pattern": "[domain-name:value = 'cryptsoftdataconliaco.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a9cc-4682-9451-4cc8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:47.000Z",
"modified": "2018-03-13T13:32:47.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.107.91.52']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-06f0-4255-ae08-45f8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:48.000Z",
"modified": "2018-03-13T13:32:48.000Z",
"pattern": "[domain-name:value = 'csh0p.ru']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1b30-48a3-86bd-42d0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:48.000Z",
"modified": "2018-03-13T13:32:48.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.120.214.195']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-6e2c-477f-ac93-46d5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:49.000Z",
"modified": "2018-03-13T13:32:49.000Z",
"pattern": "[domain-name:value = 'cvvshop.lv']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7844-49cc-ab9f-4203950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:49.000Z",
"modified": "2018-03-13T13:32:49.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.120.246.101']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-e120-4816-b6b5-483b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:49.000Z",
"modified": "2018-03-13T13:32:49.000Z",
"pattern": "[domain-name:value = 'cysticarpicp.bulkmessage-226.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5ce4-4078-850e-4225950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:50.000Z",
"modified": "2018-03-13T13:32:50.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.121.206.4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-5158-4c23-8fe2-4ddc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:50.000Z",
"modified": "2018-03-13T13:32:50.000Z",
"pattern": "[domain-name:value = 'cytotropisml.megabulkmessage243.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b2f0-4f95-a7c0-4aaf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:51.000Z",
"modified": "2018-03-13T13:32:51.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.121.214.139']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-cc80-462c-a089-4e96950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:51.000Z",
"modified": "2018-03-13T13:32:51.000Z",
"pattern": "[domain-name:value = 'decennarya.message-services-237.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b860-491e-814d-4cf9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:51.000Z",
"modified": "2018-03-13T13:32:51.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.121.223.150']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-480c-401e-bab4-492d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:52.000Z",
"modified": "2018-03-13T13:32:52.000Z",
"pattern": "[domain-name:value = 'deformetere.francegirls.club']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ca50-4462-a13e-4ec7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:52.000Z",
"modified": "2018-03-13T13:32:52.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.160.28.196']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-c398-4685-af97-42ab950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:52.000Z",
"modified": "2018-03-13T13:32:52.000Z",
"pattern": "[domain-name:value = 'deliberatelyr.megabulkmessage246.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ef64-41fd-b7c6-450a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:53.000Z",
"modified": "2018-03-13T13:32:53.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.166.208.203']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-61e8-4981-8e0f-4430950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:53.000Z",
"modified": "2018-03-13T13:32:53.000Z",
"pattern": "[domain-name:value = 'deresinizez.message-services-226.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-06cc-4f04-be98-4292950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:54.000Z",
"modified": "2018-03-13T13:32:54.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.166.237.170']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-bb78-4bf9-982b-45ca950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:54.000Z",
"modified": "2018-03-13T13:32:54.000Z",
"pattern": "[domain-name:value = 'development.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-172c-4ef8-bf92-4526950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:54.000Z",
"modified": "2018-03-13T13:32:54.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.172.179.12']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-35d8-4e74-9dd5-4034950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:55.000Z",
"modified": "2018-03-13T13:32:55.000Z",
"pattern": "[domain-name:value = 'devqa.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-020c-4fe6-8db1-4da1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:55.000Z",
"modified": "2018-03-13T13:32:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.172.255.73']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-a098-4f95-8672-483c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:56.000Z",
"modified": "2018-03-13T13:32:56.000Z",
"pattern": "[domain-name:value = 'dfhuytklop.name']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-03f8-4688-b729-4853950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:56.000Z",
"modified": "2018-03-13T13:32:56.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.175.6.103']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-2200-4092-bac0-4ee7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:56.000Z",
"modified": "2018-03-13T13:32:56.000Z",
"pattern": "[domain-name:value = 'dianoeticb.meet-girls.club']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-fbbc-4c6c-9e36-4b73950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:57.000Z",
"modified": "2018-03-13T13:32:57.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.224.31.205']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-b178-4906-a02a-4de7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:57.000Z",
"modified": "2018-03-13T13:32:57.000Z",
"pattern": "[domain-name:value = 'disunitesq.meet-girls.club']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2f44-413a-8bb2-4d29950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:58.000Z",
"modified": "2018-03-13T13:32:58.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.237.41.199']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-fe88-4bf6-a95b-43ea950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:58.000Z",
"modified": "2018-03-13T13:32:58.000Z",
"pattern": "[domain-name:value = 'diuhqioduqwdioqdhuqwd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9b70-4642-849d-4205950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:58.000Z",
"modified": "2018-03-13T13:32:58.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.239.19.36']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-56ec-4367-bcb7-44ef950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:59.000Z",
"modified": "2018-03-13T13:32:59.000Z",
"pattern": "[domain-name:value = 'dkkdjslla.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ac98-4179-ad53-4283950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:59.000Z",
"modified": "2018-03-13T13:32:59.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.239.19.74']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-dd68-464f-b1bc-4cf0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:32:59.000Z",
"modified": "2018-03-13T13:32:59.000Z",
"pattern": "[domain-name:value = 'dlbhbifjnseaavc.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:32:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bbcc-47a9-9948-4ef5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:00.000Z",
"modified": "2018-03-13T13:33:00.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.75.47.229']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-550c-410e-91a1-4b7d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:00.000Z",
"modified": "2018-03-13T13:33:00.000Z",
"pattern": "[domain-name:value = 'doawndazzzzw.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-da3c-4b77-b4be-4726950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:01.000Z",
"modified": "2018-03-13T13:33:01.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.96.148.33']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-f35c-44c9-a88e-4b9a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:01.000Z",
"modified": "2018-03-13T13:33:01.000Z",
"pattern": "[domain-name:value = 'doijqfqnhweqwepapaos.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0dc4-4a25-9c28-4d32950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:01.000Z",
"modified": "2018-03-13T13:33:01.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '109.96.248.32']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-5a98-4a79-b99d-4ff5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:02.000Z",
"modified": "2018-03-13T13:33:02.000Z",
"pattern": "[domain-name:value = 'dollarsv.meet-girls.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2e28-4875-b206-4cff950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:02.000Z",
"modified": "2018-03-13T13:33:02.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '118.179.46.6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-a938-4085-bdf3-41c5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:03.000Z",
"modified": "2018-03-13T13:33:03.000Z",
"pattern": "[domain-name:value = 'dopaoxidasee.mailer-service205.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-3e24-4d46-8ca7-47f9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:03.000Z",
"modified": "2018-03-13T13:33:03.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '124.248.191.64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6fb8-43dc-928b-4988950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:03.000Z",
"modified": "2018-03-13T13:33:03.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '128.140.229.203']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-1cf4-47b7-a561-44c7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:04.000Z",
"modified": "2018-03-13T13:33:04.000Z",
"pattern": "[domain-name:value = 'doqknedornadayqwey.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7208-442a-b8db-4055950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:04.000Z",
"modified": "2018-03-13T13:33:04.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '129.208.126.241']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8cc8-4d55-8f93-4786950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:05.000Z",
"modified": "2018-03-13T13:33:05.000Z",
"pattern": "[domain-name:value = 'dqiwdiyqbwdqwdquwd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6e7c-4bfb-a832-4c89950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:05.000Z",
"modified": "2018-03-13T13:33:05.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '130.204.159.32']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-05fc-44c2-a57e-42f8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:05.000Z",
"modified": "2018-03-13T13:33:05.000Z",
"pattern": "[domain-name:value = 'drunkennessess.message-services-204.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7004-4dbc-bd4d-4256950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:06.000Z",
"modified": "2018-03-13T13:33:06.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '130.204.182.230']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-7cd8-4c06-ba05-43cd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:06.000Z",
"modified": "2018-03-13T13:33:06.000Z",
"pattern": "[domain-name:value = 'ebanatibliatskazalebatvas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8190-4a84-a4a7-4ea8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:06.000Z",
"modified": "2018-03-13T13:33:06.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '130.204.21.137']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-f670-4829-b7e1-4681950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:07.000Z",
"modified": "2018-03-13T13:33:07.000Z",
"pattern": "[domain-name:value = 'economisme.message-services-231.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8f98-478a-9c90-4284950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:07.000Z",
"modified": "2018-03-13T13:33:07.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '130.204.234.81']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8070-4a44-8dff-43b9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:08.000Z",
"modified": "2018-03-13T13:33:08.000Z",
"pattern": "[domain-name:value = 'eitherlicwocommuniencl.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-aa20-4bcb-bb76-470f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:08.000Z",
"modified": "2018-03-13T13:33:08.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '143.208.165.42']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-0368-46dd-b7c9-4f9b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:08.000Z",
"modified": "2018-03-13T13:33:08.000Z",
"pattern": "[domain-name:value = 'eoureottuekhsdew.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b3dc-4871-8e24-468d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:09.000Z",
"modified": "2018-03-13T13:33:09.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.237.138.38']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8ca0-4826-9841-4afe950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:09.000Z",
"modified": "2018-03-13T13:33:09.000Z",
"pattern": "[domain-name:value = 'feathertopx.francegirls.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c374-435f-ad18-48cd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:10.000Z",
"modified": "2018-03-13T13:33:10.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.237.80.80']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-118c-4001-8ec1-4717950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:10.000Z",
"modified": "2018-03-13T13:33:10.000Z",
"pattern": "[domain-name:value = 'fidicinall.megabulkmessage242.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c5c4-459c-ac3a-4a1c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:10.000Z",
"modified": "2018-03-13T13:33:10.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.237.82.2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8d7c-472a-ac34-45bd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:11.000Z",
"modified": "2018-03-13T13:33:11.000Z",
"pattern": "[domain-name:value = 'fitnesstortliable.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d048-4a75-b588-4f1f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:11.000Z",
"modified": "2018-03-13T13:33:11.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.251.23.210']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-0afc-408d-a749-45ce950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:12.000Z",
"modified": "2018-03-13T13:33:12.000Z",
"pattern": "[domain-name:value = 'flotsamc.bulkmessage-205.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c8d4-45e6-a957-4d2b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:12.000Z",
"modified": "2018-03-13T13:33:12.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '151.252.202.94']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-936c-43c2-bd83-418f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:12.000Z",
"modified": "2018-03-13T13:33:12.000Z",
"pattern": "[domain-name:value = 'foradocumentcontr.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c228-45d9-a478-4eb8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:13.000Z",
"modified": "2018-03-13T13:33:13.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '154.66.3.162']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-0a48-40bf-af86-4b40950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:13.000Z",
"modified": "2018-03-13T13:33:13.000Z",
"pattern": "[domain-name:value = 'formasnetoyvnastrchine.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c0f4-4c9f-a8a1-4880950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:14.000Z",
"modified": "2018-03-13T13:33:14.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '155.133.93.30']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-51e0-4c96-a9ee-4b7e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:14.000Z",
"modified": "2018-03-13T13:33:14.000Z",
"pattern": "[domain-name:value = 'formasnirovanienahacb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bca0-47c8-9580-4f07950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:14.000Z",
"modified": "2018-03-13T13:33:14.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.202.176.148']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-afbc-4bcd-a09a-4563950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:15.000Z",
"modified": "2018-03-13T13:33:15.000Z",
"pattern": "[domain-name:value = 'fortrunernaskdneazxd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bfb8-4722-af5c-491f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:15.000Z",
"modified": "2018-03-13T13:33:15.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.202.181.176']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-3958-4432-9495-4c03950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:15.000Z",
"modified": "2018-03-13T13:33:15.000Z",
"pattern": "[domain-name:value = 'forvardinganyyouwna.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d1a8-421c-95b0-4546950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:16.000Z",
"modified": "2018-03-13T13:33:16.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.202.190.110']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ecf8-43bd-9d34-49d9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:16.000Z",
"modified": "2018-03-13T13:33:16.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '176.223.180.238']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-ae40-414a-9f0c-45dc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:17.000Z",
"modified": "2018-03-13T13:33:17.000Z",
"pattern": "[domain-name:value = 'fqiwdkigjuiandasdasdj.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-2648-4894-9560-43d9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:17.000Z",
"modified": "2018-03-13T13:33:17.000Z",
"pattern": "[domain-name:value = 'ftp.qpweouplmmojdaiq.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f074-42ed-8604-4d07950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:17.000Z",
"modified": "2018-03-13T13:33:17.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.153.15.117']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-87a8-448e-b259-403b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:18.000Z",
"modified": "2018-03-13T13:33:18.000Z",
"pattern": "[domain-name:value = 'fuckasbichsoseksnaset.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e2c0-42f1-89df-4e60950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:18.000Z",
"modified": "2018-03-13T13:33:18.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.153.4.249']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-05f0-4c69-a145-437e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:19.000Z",
"modified": "2018-03-13T13:33:19.000Z",
"pattern": "[domain-name:value = 'gmumwmiwoqegwiwo.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e574-49fc-ad99-4371950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:19.000Z",
"modified": "2018-03-13T13:33:19.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.169.197.24']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e7c4-4a98-bff4-4ac3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:19.000Z",
"modified": "2018-03-13T13:33:19.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.169.216.126']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-7d94-488e-85f7-4f9c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:20.000Z",
"modified": "2018-03-13T13:33:20.000Z",
"pattern": "[domain-name:value = 'godetiaw.message-services-218.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-cb9c-457a-ae82-4447950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:20.000Z",
"modified": "2018-03-13T13:33:20.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.169.217.56']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-f7f4-4c54-944f-4d5b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:20.000Z",
"modified": "2018-03-13T13:33:20.000Z",
"pattern": "[domain-name:value = 'gokokijsdjnxcpapdoasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-99f8-4c63-9665-4c18950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:21.000Z",
"modified": "2018-03-13T13:33:21.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.237.74.213']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8fa0-4a1c-8ac3-46bc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:21.000Z",
"modified": "2018-03-13T13:33:21.000Z",
"pattern": "[domain-name:value = 'goloduha.info']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8988-43f5-8ba1-4eec950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:22.000Z",
"modified": "2018-03-13T13:33:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.48.148.50']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-080c-4c8e-87f6-41ce950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:22.000Z",
"modified": "2018-03-13T13:33:22.000Z",
"pattern": "[domain-name:value = 'gorodkoff.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7d00-4d6e-bd1d-4353950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:22.000Z",
"modified": "2018-03-13T13:33:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.48.180.1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-952c-4366-9231-467e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:23.000Z",
"modified": "2018-03-13T13:33:23.000Z",
"pattern": "[domain-name:value = 'hdclips111.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-84c8-4099-aec9-45b7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:23.000Z",
"modified": "2018-03-13T13:33:23.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.48.52.161']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-22b0-4ff4-beb3-4f30950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:24.000Z",
"modified": "2018-03-13T13:33:24.000Z",
"pattern": "[domain-name:value = 'helpdesk.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7390-4528-9bdc-4e0f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:24.000Z",
"modified": "2018-03-13T13:33:24.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '178.48.52.180']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-ad78-485a-8820-46bc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:24.000Z",
"modified": "2018-03-13T13:33:24.000Z",
"pattern": "[domain-name:value = 'homonymsv.megabulkmessage82.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6bb8-4cd0-b24b-4b66950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:25.000Z",
"modified": "2018-03-13T13:33:25.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.130.130']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-5078-45c9-a666-4672950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:25.000Z",
"modified": "2018-03-13T13:33:25.000Z",
"pattern": "[domain-name:value = 'httpbusinessdirect.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6da4-4bfa-85c4-47c2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:25.000Z",
"modified": "2018-03-13T13:33:25.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.157.99']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-cfec-4887-932c-447e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:26.000Z",
"modified": "2018-03-13T13:33:26.000Z",
"pattern": "[domain-name:value = 'hudsonenorincludes.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-76fc-44e4-a6f4-4052950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:26.000Z",
"modified": "2018-03-13T13:33:26.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.177.192']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-6d74-480a-a496-492c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:27.000Z",
"modified": "2018-03-13T13:33:27.000Z",
"pattern": "[domain-name:value = 'hyperpatriotick.megabulkmessage246.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6ccc-4c94-919e-49e6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:27.000Z",
"modified": "2018-03-13T13:33:27.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.211.224']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-f774-49e9-b165-4e6f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:27.000Z",
"modified": "2018-03-13T13:33:27.000Z",
"pattern": "[domain-name:value = 'igjqwnedjgqwnqwemnta.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-72a0-4dfc-88bc-4fd3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:28.000Z",
"modified": "2018-03-13T13:33:28.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.30.6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-6fe0-409c-ba96-4719950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:28.000Z",
"modified": "2018-03-13T13:33:28.000Z",
"pattern": "[domain-name:value = 'iinashenty.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-78d8-47bb-be56-481e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:29.000Z",
"modified": "2018-03-13T13:33:29.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.53.127']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-d910-4f1d-8241-4f15950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:29.000Z",
"modified": "2018-03-13T13:33:29.000Z",
"pattern": "[domain-name:value = 'ijdqnwdquwdoasidj.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-91d0-442d-af94-40f5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:29.000Z",
"modified": "2018-03-13T13:33:29.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.71.174']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-31d8-4548-84ec-415a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:30.000Z",
"modified": "2018-03-13T13:33:30.000Z",
"pattern": "[domain-name:value = 'ijqdjqnwiduqujqiuezxc.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b2fc-4fd9-8f8a-43c6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:30.000Z",
"modified": "2018-03-13T13:33:30.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '181.160.87.46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8910-4e36-9527-4fe5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:31.000Z",
"modified": "2018-03-13T13:33:31.000Z",
"pattern": "[domain-name:value = 'ijqudqjweomasndqw.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bd80-4625-ac3a-47db950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:31.000Z",
"modified": "2018-03-13T13:33:31.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.186.129.175']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-fa10-4537-b97a-4d19950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:31.000Z",
"modified": "2018-03-13T13:33:31.000Z",
"pattern": "[domain-name:value = 'includeandcomdamage.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a66c-4e4e-b6e2-4b51950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:32.000Z",
"modified": "2018-03-13T13:33:32.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.42.194.116']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-6e94-4130-b608-4474950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:32.000Z",
"modified": "2018-03-13T13:33:32.000Z",
"pattern": "[domain-name:value = 'includingretainaand.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-aab0-4e40-8494-445b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:32.000Z",
"modified": "2018-03-13T13:33:32.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.47.5.4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-eb4c-4c8f-9d0c-4547950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:33.000Z",
"modified": "2018-03-13T13:33:33.000Z",
"pattern": "[domain-name:value = 'indefinablyt.message-services-239.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-7038-4899-808e-4008950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:33.000Z",
"modified": "2018-03-13T13:33:33.000Z",
"pattern": "[domain-name:value = 'ing-direct.co']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9fb8-4b54-94a1-414e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:34.000Z",
"modified": "2018-03-13T13:33:34.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '185.94.4.228']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-f0d8-4c49-844e-4273950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:34.000Z",
"modified": "2018-03-13T13:33:34.000Z",
"pattern": "[domain-name:value = 'insubmissiveo.megabulkmessage245.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9a9c-41d8-9d8b-44e5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:34.000Z",
"modified": "2018-03-13T13:33:34.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.33.186.71']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-70b0-485d-b589-48fa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:35.000Z",
"modified": "2018-03-13T13:33:35.000Z",
"pattern": "[domain-name:value = 'ipomnjdhaweenbi.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-825c-4686-8366-48af950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:35.000Z",
"modified": "2018-03-13T13:33:35.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.49.11.132']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-e214-4fcb-87bf-442d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:36.000Z",
"modified": "2018-03-13T13:33:36.000Z",
"pattern": "[domain-name:value = 'iuodqndiqndunqwbqwe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-53d8-4be7-8afd-4df9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:36.000Z",
"modified": "2018-03-13T13:33:36.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.49.41.240']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-74ac-4fe3-b925-4979950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:36.000Z",
"modified": "2018-03-13T13:33:36.000Z",
"pattern": "[domain-name:value = 'jajzonjgjzkfjene.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4430-4d09-919f-4c37950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:37.000Z",
"modified": "2018-03-13T13:33:37.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.49.9.164']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-ffd8-4ecb-bdff-4ddb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:37.000Z",
"modified": "2018-03-13T13:33:37.000Z",
"pattern": "[domain-name:value = 'jhijdqwughasndaseqw.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-3d20-4140-86ef-4aaf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:38.000Z",
"modified": "2018-03-13T13:33:38.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.50.90.58']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-8208-4759-9baa-4f91950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:38.000Z",
"modified": "2018-03-13T13:33:38.000Z",
"pattern": "[domain-name:value = 'juventudez.datingmailll.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-51cc-46b3-8987-474f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:38.000Z",
"modified": "2018-03-13T13:33:38.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.50.93.30']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-0690-41b6-90d1-47d2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:39.000Z",
"modified": "2018-03-13T13:33:39.000Z",
"pattern": "[domain-name:value = 'kasmeniaksdneqweoo.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-573c-4df3-b865-42a2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:39.000Z",
"modified": "2018-03-13T13:33:39.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.50.98.163']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-9cac-4c93-b505-4c66950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:39.000Z",
"modified": "2018-03-13T13:33:39.000Z",
"pattern": "[domain-name:value = 'kkansdqwjeeqbnvczmxc.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-728c-45ce-9cde-4ed3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:40.000Z",
"modified": "2018-03-13T13:33:40.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.52.122.175']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-faec-42c8-b51e-426b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:40.000Z",
"modified": "2018-03-13T13:33:40.000Z",
"pattern": "[domain-name:value = 'knuckledd.megabulkmessage240.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6028-4d1c-9e2c-49e6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:41.000Z",
"modified": "2018-03-13T13:33:41.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.73.245.226']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-673c-42a3-b31d-4541950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:41.000Z",
"modified": "2018-03-13T13:33:41.000Z",
"pattern": "[domain-name:value = 'kootenayk.francegirls.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4b6c-4e0d-b8ae-4fab950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:41.000Z",
"modified": "2018-03-13T13:33:41.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.74.208.84']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-dc24-4a89-8c24-4b88950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:42.000Z",
"modified": "2018-03-13T13:33:42.000Z",
"pattern": "[domain-name:value = 'kormoviedelaanymanytree.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-238c-4753-99c1-4ecc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:42.000Z",
"modified": "2018-03-13T13:33:42.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '186.87.135.2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-49a0-419f-88e9-4eb4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:43.000Z",
"modified": "2018-03-13T13:33:43.000Z",
"pattern": "[domain-name:value = 'kormushkinskasneqwe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1aec-4465-b9b4-4412950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:43.000Z",
"modified": "2018-03-13T13:33:43.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.126.9.128']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-c84c-4988-8aab-439b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:43.000Z",
"modified": "2018-03-13T13:33:43.000Z",
"pattern": "[domain-name:value = 'kornilaniusanymanytron.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f9b0-47e6-aa48-409a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:44.000Z",
"modified": "2018-03-13T13:33:44.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.127.95.144']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-3d98-4daa-a1e9-4297950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:44.000Z",
"modified": "2018-03-13T13:33:44.000Z",
"pattern": "[domain-name:value = 'kqeopgmamkwjwewe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-02a4-4467-be1c-4ff3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:45.000Z",
"modified": "2018-03-13T13:33:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.129.254.9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-c734-482c-88c9-469c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:45.000Z",
"modified": "2018-03-13T13:33:45.000Z",
"pattern": "[domain-name:value = 'kronashjeeeaqqforny.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-204c-4200-838e-40d7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:45.000Z",
"modified": "2018-03-13T13:33:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.138.148.150']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-489c-411c-912f-4e63950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:46.000Z",
"modified": "2018-03-13T13:33:46.000Z",
"pattern": "[domain-name:value = 'lago222.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5758-442a-af2c-440a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:46.000Z",
"modified": "2018-03-13T13:33:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.142.151.4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-cf7c-4e50-a6df-4688950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:46.000Z",
"modified": "2018-03-13T13:33:46.000Z",
"pattern": "[domain-name:value = 'lairdieb.francegirls.club']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-79b0-48d3-8f92-48a5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:47.000Z",
"modified": "2018-03-13T13:33:47.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.172.83.254']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-60e8-44f3-abb2-4e06950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:47.000Z",
"modified": "2018-03-13T13:33:47.000Z",
"pattern": "[domain-name:value = 'lampflowerg.message-services-229.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ca20-43e3-9634-44a7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:48.000Z",
"modified": "2018-03-13T13:33:48.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.172.83.94']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-dff8-40ae-bcea-488f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:48.000Z",
"modified": "2018-03-13T13:33:48.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.173.245.178']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-e764-4326-ac50-4544950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:48.000Z",
"modified": "2018-03-13T13:33:48.000Z",
"pattern": "[domain-name:value = 'leadingss.message-services-227.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f56c-42ed-ab91-4166950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:49.000Z",
"modified": "2018-03-13T13:33:49.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.208.134.201']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-69f8-4902-8c3d-42cc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:49.000Z",
"modified": "2018-03-13T13:33:49.000Z",
"pattern": "[domain-name:value = 'liceindividualshall.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-eec0-4ecd-85c5-4c18950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:50.000Z",
"modified": "2018-03-13T13:33:50.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.237.190.24']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ee54-480f-b4ee-4eea950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:50.000Z",
"modified": "2018-03-13T13:33:50.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.139.65']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-0140-42b4-aa48-420e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:50.000Z",
"modified": "2018-03-13T13:33:50.000Z",
"pattern": "[domain-name:value = 'limmayyouramake.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-7d30-4578-b4f5-445b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:51.000Z",
"modified": "2018-03-13T13:33:51.000Z",
"pattern": "[domain-name:value = 'lipothymich.message-services-206.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d100-4708-94d8-47f7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:51.000Z",
"modified": "2018-03-13T13:33:51.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.146.131']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-0e9c-49ff-9e87-4841950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:51.000Z",
"modified": "2018-03-13T13:33:51.000Z",
"pattern": "[domain-name:value = 'lkamanbvcvzhaejw.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f290-432f-a28f-4739950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:52.000Z",
"modified": "2018-03-13T13:33:52.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.153.71']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ce34-43be-9797-4be4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:52.000Z",
"modified": "2018-03-13T13:33:52.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.154.26']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-92c0-45c3-970f-4ec7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:53.000Z",
"modified": "2018-03-13T13:33:53.000Z",
"pattern": "[domain-name:value = 'marantas.white-messages-225.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d14c-4b30-a425-4485950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:53.000Z",
"modified": "2018-03-13T13:33:53.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.160.64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-210c-4346-af3d-43c7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:53.000Z",
"modified": "2018-03-13T13:33:53.000Z",
"pattern": "[domain-name:value = 'mcduck.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b6b4-4313-a8fe-46ad950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:54.000Z",
"modified": "2018-03-13T13:33:54.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.161.255']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-9a40-4328-b313-4a3a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:54.000Z",
"modified": "2018-03-13T13:33:54.000Z",
"pattern": "[domain-name:value = 'mcduck.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b134-4c2e-bfc0-414b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:55.000Z",
"modified": "2018-03-13T13:33:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.169.148']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-030c-4963-ab37-4403950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:55.000Z",
"modified": "2018-03-13T13:33:55.000Z",
"pattern": "[domain-name:value = 'media.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a3e4-4a88-aba7-47f5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:55.000Z",
"modified": "2018-03-13T13:33:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.173.106']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-9284-40b5-83d7-4ea4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:56.000Z",
"modified": "2018-03-13T13:33:56.000Z",
"pattern": "[domain-name:value = 'mincludesthisincluding.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b37c-4b47-ad63-4ccd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:56.000Z",
"modified": "2018-03-13T13:33:56.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.178.48']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-17d4-4df1-8712-4d23950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:56.000Z",
"modified": "2018-03-13T13:33:56.000Z",
"pattern": "[domain-name:value = 'minimalsr.message-services-229.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b374-4eba-85bd-41fc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:57.000Z",
"modified": "2018-03-13T13:33:57.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.252.114']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-94f0-40c6-b3ce-466b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:57.000Z",
"modified": "2018-03-13T13:33:57.000Z",
"pattern": "[domain-name:value = 'miscapoerasun.ws']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ba10-41a1-844d-43aa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:58.000Z",
"modified": "2018-03-13T13:33:58.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.26.64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-f4c0-4e15-8274-481c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:58.000Z",
"modified": "2018-03-13T13:33:58.000Z",
"pattern": "[domain-name:value = 'mitelinaris.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c2a0-4fb1-852b-4bca950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:58.000Z",
"modified": "2018-03-13T13:33:58.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.254.142.91']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-7d30-4bcc-94d7-4b26950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:59.000Z",
"modified": "2018-03-13T13:33:59.000Z",
"pattern": "[domain-name:value = 'mnhgrewqfdsjh.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d238-4d2c-b00e-4c3b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:33:59.000Z",
"modified": "2018-03-13T13:33:59.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.254.187.254']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:33:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-f088-4075-b41e-4ad5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:00.000Z",
"modified": "2018-03-13T13:34:00.000Z",
"pattern": "[domain-name:value = 'mnmnzxczxcasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c4e8-4cf9-bb98-450e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:00.000Z",
"modified": "2018-03-13T13:34:00.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.254.205.37']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-6e08-4b09-b7ab-4856950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:00.000Z",
"modified": "2018-03-13T13:34:00.000Z",
"pattern": "[domain-name:value = 'mnzxbcasaaaty.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c79c-4425-957a-42fa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:01.000Z",
"modified": "2018-03-13T13:34:01.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.44.66']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-ee44-439a-93a9-4bdb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:01.000Z",
"modified": "2018-03-13T13:34:01.000Z",
"pattern": "[domain-name:value = 'mormaornasieasdmnqwje.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b1b4-43f7-bdc2-468e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:01.000Z",
"modified": "2018-03-13T13:34:01.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.25.5.184']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-73f8-4c57-a0db-4592950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:02.000Z",
"modified": "2018-03-13T13:34:02.000Z",
"pattern": "[domain-name:value = 'mrazostasosihuiogromnie.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a720-4233-a24d-4634950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:02.000Z",
"modified": "2018-03-13T13:34:02.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.119.100']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-efe8-4c5c-95cb-491a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:03.000Z",
"modified": "2018-03-13T13:34:03.000Z",
"pattern": "[domain-name:value = 'mycodermat.message-services-234.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9c28-4617-b260-49e7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:03.000Z",
"modified": "2018-03-13T13:34:03.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.138.139']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-72e0-4f68-aba0-40ef950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:03.000Z",
"modified": "2018-03-13T13:34:03.000Z",
"pattern": "[domain-name:value = 'naheqbhbzgbnqbza.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a4b8-4c58-b24f-4b35950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:04.000Z",
"modified": "2018-03-13T13:34:04.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.176.126']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b780-c8ec-46a6-9557-41c6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:04.000Z",
"modified": "2018-03-13T13:34:04.000Z",
"pattern": "[domain-name:value = 'nandcopynotsource.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bbbc-485e-859c-4c07950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:05.000Z",
"modified": "2018-03-13T13:34:05.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.234.205']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-47bc-426b-9431-45a5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:05.000Z",
"modified": "2018-03-13T13:34:05.000Z",
"pattern": "[domain-name:value = 'nasathisincluding.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ce10-4d56-9124-4474950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:05.000Z",
"modified": "2018-03-13T13:34:05.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.43.76']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-aaac-4774-91e5-49f7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:06.000Z",
"modified": "2018-03-13T13:34:06.000Z",
"pattern": "[domain-name:value = 'nbhvnfhrnmc.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bc10-4163-a86c-4a28950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:06.000Z",
"modified": "2018-03-13T13:34:06.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.26.90.183']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-21ec-4452-8f14-4802950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:06.000Z",
"modified": "2018-03-13T13:34:06.000Z",
"pattern": "[domain-name:value = 'nexiverifica.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d3dc-4af4-931e-46fa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:07.000Z",
"modified": "2018-03-13T13:34:07.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.139.64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-7e9c-43f5-ba21-4fd6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:07.000Z",
"modified": "2018-03-13T13:34:07.000Z",
"pattern": "[domain-name:value = 'njsjdnasbdwdd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c5c4-4f79-9fd0-46ec950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:08.000Z",
"modified": "2018-03-13T13:34:08.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.185.67']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2520-4e5f-8c98-4ff0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:08.000Z",
"modified": "2018-03-13T13:34:08.000Z",
"pattern": "[domain-name:value = 'nvnvnvnvcbcbcxbx.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e114-423d-9e09-4ecc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:08.000Z",
"modified": "2018-03-13T13:34:08.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.193.102']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-a750-4238-bd84-4624950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:09.000Z",
"modified": "2018-03-13T13:34:09.000Z",
"pattern": "[domain-name:value = 'nvvnfjvnfjcdnj.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f494-49d7-9767-46ee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:09.000Z",
"modified": "2018-03-13T13:34:09.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.198.173']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1ebc-477a-bd20-4352950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:10.000Z",
"modified": "2018-03-13T13:34:10.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.226.49']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1e90-42ad-a0af-4698950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:11.000Z",
"modified": "2018-03-13T13:34:11.000Z",
"pattern": "[domain-name:value = 'oaijbuzxcunasdjn.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5a78-46f4-a2f3-4618950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:11.000Z",
"modified": "2018-03-13T13:34:11.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.27.87.46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9634-4aa6-a067-45ba950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:12.000Z",
"modified": "2018-03-13T13:34:12.000Z",
"pattern": "[domain-name:value = 'occasionallyl.dumareding.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8310-4208-83d5-4bee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:12.000Z",
"modified": "2018-03-13T13:34:12.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.6.93.122']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-eab0-4e8c-9659-417a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:12.000Z",
"modified": "2018-03-13T13:34:12.000Z",
"pattern": "[domain-name:value = 'odkqiwhebqesdassdios.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-3c70-4d00-8169-4700950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:13.000Z",
"modified": "2018-03-13T13:34:13.000Z",
"pattern": "[domain-name:value = 'oirtmnbrctesnas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7b38-461e-b19f-4377950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:13.000Z",
"modified": "2018-03-13T13:34:13.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '188.74.189.98']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9ab0-4298-a3c6-4c5f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:14.000Z",
"modified": "2018-03-13T13:34:14.000Z",
"pattern": "[domain-name:value = 'ojzasduqnwdwdqdqd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7428-4d6a-a8db-4ba7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:14.000Z",
"modified": "2018-03-13T13:34:14.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '190.158.226.15']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-195c-4b3a-a530-43b6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:14.000Z",
"modified": "2018-03-13T13:34:14.000Z",
"pattern": "[domain-name:value = 'okasdmneqneeee.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5800-4c16-a5e5-45f8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:15.000Z",
"modified": "2018-03-13T13:34:15.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '190.213.108.96']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9e48-47e2-8187-439b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:15.000Z",
"modified": "2018-03-13T13:34:15.000Z",
"pattern": "[domain-name:value = 'okdiqybgquwdnqwda.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5604-4c95-b99d-45c2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:16.000Z",
"modified": "2018-03-13T13:34:16.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '190.218.94.128']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2334-4d22-93b3-453f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:16.000Z",
"modified": "2018-03-13T13:34:16.000Z",
"pattern": "[domain-name:value = 'okfqibhzxczzdqjwnqd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-659c-4c1b-9593-4daa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:17.000Z",
"modified": "2018-03-13T13:34:17.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '190.219.202.4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-a62c-49f4-be70-490a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:17.000Z",
"modified": "2018-03-13T13:34:17.000Z",
"pattern": "[domain-name:value = 'okijgtfrbgkzamhjweeor.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7408-45b9-87b2-4a9d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:17.000Z",
"modified": "2018-03-13T13:34:17.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '190.83.171.183']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-3cac-4e03-8ef7-45a7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:18.000Z",
"modified": "2018-03-13T13:34:18.000Z",
"pattern": "[domain-name:value = 'okjeintmotorsy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6c94-4f26-b278-42c2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:18.000Z",
"modified": "2018-03-13T13:34:18.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.107.99.167']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7650-4d28-b952-437b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:19.000Z",
"modified": "2018-03-13T13:34:19.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.224.93.48']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-c454-4635-a14f-4ea5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:19.000Z",
"modified": "2018-03-13T13:34:19.000Z",
"pattern": "[domain-name:value = 'okljulihyjhg.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9970-40c4-8fd1-4fea950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:19.000Z",
"modified": "2018-03-13T13:34:19.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.33.1.19']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2f78-4f43-921f-4eda950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:20.000Z",
"modified": "2018-03-13T13:34:20.000Z",
"pattern": "[domain-name:value = 'okqdmwnenehsbndsd.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-99cc-4eab-be8a-4231950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:20.000Z",
"modified": "2018-03-13T13:34:20.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.33.1.236']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-b658-46d1-91c0-468c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:21.000Z",
"modified": "2018-03-13T13:34:21.000Z",
"pattern": "[domain-name:value = 'onlyplacesattributionthe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-aa2c-4a42-bbcc-4474950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:21.000Z",
"modified": "2018-03-13T13:34:21.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '193.77.184.140']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2a14-4a0a-8430-46be950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:21.000Z",
"modified": "2018-03-13T13:34:21.000Z",
"pattern": "[domain-name:value = 'ooiiuuyy.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bd48-42f6-8694-49ee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:22.000Z",
"modified": "2018-03-13T13:34:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '194.116.183.233']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-a7f8-4ae6-9025-4c6e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:22.000Z",
"modified": "2018-03-13T13:34:22.000Z",
"pattern": "[domain-name:value = 'oonyasnytreeaggnra.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b7c8-44be-ad2e-4e7f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:22.000Z",
"modified": "2018-03-13T13:34:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '194.204.25.137']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-163c-45fa-8f5e-4959950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:23.000Z",
"modified": "2018-03-13T13:34:23.000Z",
"pattern": "[domain-name:value = 'oooomaens.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-cae4-4727-87a3-4e01950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:23.000Z",
"modified": "2018-03-13T13:34:23.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '195.222.40.54']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-8ac0-4042-ba99-4dd1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:24.000Z",
"modified": "2018-03-13T13:34:24.000Z",
"pattern": "[domain-name:value = 'oooweqwnenwqew.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-cc6c-4b18-bc18-495c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:24.000Z",
"modified": "2018-03-13T13:34:24.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '195.228.41.2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-fcec-4f8e-a9dc-4628950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:24.000Z",
"modified": "2018-03-13T13:34:24.000Z",
"pattern": "[domain-name:value = 'oopsyinghhoasneas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0f94-4046-bf66-4067950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:25.000Z",
"modified": "2018-03-13T13:34:25.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '196.178.101.1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-7eb8-4ad0-82b6-4206950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:25.000Z",
"modified": "2018-03-13T13:34:25.000Z",
"pattern": "[domain-name:value = 'opensslopensslremains.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2828-4c0b-833f-49df950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:26.000Z",
"modified": "2018-03-13T13:34:26.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '196.20.111.10']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-0f5c-419d-9291-48d0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:26.000Z",
"modified": "2018-03-13T13:34:26.000Z",
"pattern": "[domain-name:value = 'opetheyoungthe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5a20-4c72-861a-4c86950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:26.000Z",
"modified": "2018-03-13T13:34:26.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '197.255.225.249']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-7b48-4700-aa3b-4789950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:27.000Z",
"modified": "2018-03-13T13:34:27.000Z",
"pattern": "[domain-name:value = 'oqijwuneqascbqwee.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6f30-4124-a4c2-4db1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:27.000Z",
"modified": "2018-03-13T13:34:27.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '200.75.242.30']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-d668-4d8f-95d2-43cd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:28.000Z",
"modified": "2018-03-13T13:34:28.000Z",
"pattern": "[domain-name:value = 'overfillingi.googleboobs43.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9188-4076-b496-48b5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:28.000Z",
"modified": "2018-03-13T13:34:28.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '200.91.115.40']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-3638-46d9-ac3d-42a3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:28.000Z",
"modified": "2018-03-13T13:34:28.000Z",
"pattern": "[domain-name:value = 'owkejanaezmzaeeqw.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9888-4f43-ada9-438e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:29.000Z",
"modified": "2018-03-13T13:34:29.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '202.131.239.125']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-902c-46aa-937c-45dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:29.000Z",
"modified": "2018-03-13T13:34:29.000Z",
"pattern": "[domain-name:value = 'paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-be64-4eba-a055-4873950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:29.000Z",
"modified": "2018-03-13T13:34:29.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '202.170.71.172']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2198-4a4a-89fe-4df7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:30.000Z",
"modified": "2018-03-13T13:34:30.000Z",
"pattern": "[domain-name:value = 'paysell.me']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ccd0-44ef-9bc3-41c8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:30.000Z",
"modified": "2018-03-13T13:34:30.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '202.175.83.34']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-a940-4501-ad81-4905950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:31.000Z",
"modified": "2018-03-13T13:34:31.000Z",
"pattern": "[domain-name:value = 'paysell.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e820-44b0-8b00-4f6e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:31.000Z",
"modified": "2018-03-13T13:34:31.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '203.190.12.108']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-4b78-49ff-8b34-44e5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:32.000Z",
"modified": "2018-03-13T13:34:32.000Z",
"pattern": "[domain-name:value = 'paysell.ws']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ddf0-48c6-9b19-4d36950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:32.000Z",
"modified": "2018-03-13T13:34:32.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '203.91.116.53']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-c6a0-4495-9bcd-48d0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:32.000Z",
"modified": "2018-03-13T13:34:32.000Z",
"pattern": "[domain-name:value = 'pedunculatedv.white-messages-242.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-4d80-41ce-b252-4769950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:33.000Z",
"modified": "2018-03-13T13:34:33.000Z",
"pattern": "[domain-name:value = 'permtheforredistrshould.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f6e8-4d3c-94a0-494a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:33.000Z",
"modified": "2018-03-13T13:34:33.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.133.241.121']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-b138-4f8e-a14e-4f9c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:34.000Z",
"modified": "2018-03-13T13:34:34.000Z",
"pattern": "[domain-name:value = 'phaethusav.bulkmessage-208.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-02fc-4218-87b6-44c5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:34.000Z",
"modified": "2018-03-13T13:34:34.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.45.77.106']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1680-433a-9671-49e1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:34.000Z",
"modified": "2018-03-13T13:34:34.000Z",
"pattern": "[domain-name:value = 'phlebectasyw.googleboobs43.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0934-4378-be42-465b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:35.000Z",
"modified": "2018-03-13T13:34:35.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.50.76.174']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-6b60-4f37-8cdc-4107950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:35.000Z",
"modified": "2018-03-13T13:34:35.000Z",
"pattern": "[domain-name:value = 'photos.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-d878-41ca-8cf3-4e4d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:35.000Z",
"modified": "2018-03-13T13:34:35.000Z",
"pattern": "[domain-name:value = 'physicologicw.message-services-231.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-fe3c-4bdc-8400-4a67950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:36.000Z",
"modified": "2018-03-13T13:34:36.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.93.154.120']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2e20-489b-9022-4337950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:36.000Z",
"modified": "2018-03-13T13:34:36.000Z",
"pattern": "[domain-name:value = 'piacabaq.message-services-220.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-fca4-4fcf-8457-4177950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:37.000Z",
"modified": "2018-03-13T13:34:37.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '212.98.131.181']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9304-4d28-af5d-4da4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:37.000Z",
"modified": "2018-03-13T13:34:37.000Z",
"pattern": "[domain-name:value = 'plexometerc.message-services-229.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0b74-4278-990d-4675950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:37.000Z",
"modified": "2018-03-13T13:34:37.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.113.187.11']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-f20c-4f67-9d73-4547950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:38.000Z",
"modified": "2018-03-13T13:34:38.000Z",
"pattern": "[domain-name:value = 'poiuartyuaneea.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-17ec-4ab9-8df0-4f01950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:38.000Z",
"modified": "2018-03-13T13:34:38.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.113.187.7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-6a14-4cd5-b967-4636950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:39.000Z",
"modified": "2018-03-13T13:34:39.000Z",
"pattern": "[domain-name:value = 'polycodiumz.white-messages-221.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1aa0-4140-9baa-4ec4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:39.000Z",
"modified": "2018-03-13T13:34:39.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.145.158.5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-c91c-4965-95a5-40d3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:39.000Z",
"modified": "2018-03-13T13:34:39.000Z",
"pattern": "[domain-name:value = 'pomvgrnqqeetree.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2204-49b4-ba4b-48a0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:40.000Z",
"modified": "2018-03-13T13:34:40.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.149.152.120']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2310-4dbd-b927-4f26950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:40.000Z",
"modified": "2018-03-13T13:34:40.000Z",
"pattern": "[domain-name:value = 'pooiukjadnqwdjnqasdne.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1edc-4197-81bc-4b9f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:41.000Z",
"modified": "2018-03-13T13:34:41.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.164.242.16']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-921c-4ede-9ea0-44aa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:41.000Z",
"modified": "2018-03-13T13:34:41.000Z",
"pattern": "[domain-name:value = 'portal.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2e74-45ca-a9ea-4d93950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:41.000Z",
"modified": "2018-03-13T13:34:41.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.214.77.145']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-fe08-40d7-a913-4d68950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:42.000Z",
"modified": "2018-03-13T13:34:42.000Z",
"pattern": "[domain-name:value = 'potomuchtosrazuskazaleb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4578-4f9a-b8e3-4d45950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:42.000Z",
"modified": "2018-03-13T13:34:42.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.214.85.90']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-5f68-4fd3-8501-4454950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:43.000Z",
"modified": "2018-03-13T13:34:43.000Z",
"pattern": "[domain-name:value = 'poywebzhgkansdqanooytre.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-612c-40d7-9fa7-4b7b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:43.000Z",
"modified": "2018-03-13T13:34:43.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.231.163.14']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-cc80-488c-97e9-4c93950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:43.000Z",
"modified": "2018-03-13T13:34:43.000Z",
"pattern": "[domain-name:value = 'pqjwenriiiasjdhewe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8bb8-43b8-acd5-4602950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:44.000Z",
"modified": "2018-03-13T13:34:44.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.231.169.71']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1990-4f70-8438-4c27950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:44.000Z",
"modified": "2018-03-13T13:34:44.000Z",
"pattern": "[domain-name:value = 'presagersy.white-messages-207.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c580-48b8-8b63-429f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:45.000Z",
"modified": "2018-03-13T13:34:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.231.178.240']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ec88-49e8-8010-4897950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:45.000Z",
"modified": "2018-03-13T13:34:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.240.207.154']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-82c0-4f18-b910-4568950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:45.000Z",
"modified": "2018-03-13T13:34:45.000Z",
"pattern": "[domain-name:value = 'providedttconformunder.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-326c-49f4-94c0-4a75950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:46.000Z",
"modified": "2018-03-13T13:34:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.6.121.106']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-e358-411a-b57e-46f0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:46.000Z",
"modified": "2018-03-13T13:34:46.000Z",
"pattern": "[domain-name:value = 'provliablepermissioncan.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4a9c-4381-a56e-4bb6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:46.000Z",
"modified": "2018-03-13T13:34:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.6.58.250']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-46ac-442c-8a4e-4f3a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:47.000Z",
"modified": "2018-03-13T13:34:47.000Z",
"pattern": "[domain-name:value = 'prvtzone.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6844-4ddc-ad5b-4f02950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:47.000Z",
"modified": "2018-03-13T13:34:47.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '213.74.138.66']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9d1c-4c8a-a4b8-4418950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:48.000Z",
"modified": "2018-03-13T13:34:48.000Z",
"pattern": "[domain-name:value = 'pyrenochaetac.message-services-229.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9528-45dd-bf1e-472e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:49.000Z",
"modified": "2018-03-13T13:34:49.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '217.150.132.241']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-f7d8-4cc0-8ac1-433f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:49.000Z",
"modified": "2018-03-13T13:34:49.000Z",
"pattern": "[domain-name:value = 'qdijqwdunqwiqhwew.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d7ec-44ea-ab65-432a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:50.000Z",
"modified": "2018-03-13T13:34:50.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '217.156.87.2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-580c-4c8d-bd84-4ebd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:50.000Z",
"modified": "2018-03-13T13:34:50.000Z",
"pattern": "[domain-name:value = 'qpweouplmmojdaiq.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-fe2c-4a1f-9e3c-4603950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:50.000Z",
"modified": "2018-03-13T13:34:50.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '217.75.83.218']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-bc28-4126-94d3-4846950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:51.000Z",
"modified": "2018-03-13T13:34:51.000Z",
"pattern": "[domain-name:value = 'qwdioandjabnwhdaw.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1dc8-4f28-aa3b-4246950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:51.000Z",
"modified": "2018-03-13T13:34:51.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '2.185.239.164']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2238-44e8-ac14-42dc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:52.000Z",
"modified": "2018-03-13T13:34:52.000Z",
"pattern": "[domain-name:value = 'qwdoimgnujaidgunqwdqd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-58bc-463f-a99a-4aaf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:52.000Z",
"modified": "2018-03-13T13:34:52.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '2.90.176.63']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-8140-4263-87d5-4549950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:52.000Z",
"modified": "2018-03-13T13:34:52.000Z",
"pattern": "[domain-name:value = 'qwdojnfujnwabzxbcawodiqw.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6728-495a-a69a-4966950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:53.000Z",
"modified": "2018-03-13T13:34:53.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '2.91.129.240']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-e23c-48ac-9deb-49f8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:53.000Z",
"modified": "2018-03-13T13:34:53.000Z",
"pattern": "[domain-name:value = 'qwdqundhaasdqwez.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-55f0-4d4c-bc29-49e0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:54.000Z",
"modified": "2018-03-13T13:34:54.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.0.216.88']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-533c-4c62-a335-4091950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:54.000Z",
"modified": "2018-03-13T13:34:54.000Z",
"pattern": "[domain-name:value = 'qwokqweijzxcsqwsxc.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-ca18-421b-83f7-4b65950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:54.000Z",
"modified": "2018-03-13T13:34:54.000Z",
"pattern": "[domain-name:value = 'qwomdiforyouamwenta.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4e18-4615-b581-4f4c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:55.000Z",
"modified": "2018-03-13T13:34:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.166.92.65']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-3ca8-46d5-a73a-42f3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:55.000Z",
"modified": "2018-03-13T13:34:55.000Z",
"pattern": "[domain-name:value = 'qwozijnbqbqqeybnbq.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4f3c-44b4-8085-4fda950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:55.000Z",
"modified": "2018-03-13T13:34:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.166.97.137']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-b514-4379-b0f0-494b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:56.000Z",
"modified": "2018-03-13T13:34:56.000Z",
"pattern": "[domain-name:value = 'reboiseu.nomelee.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6b54-4dcd-8307-4521950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:56.000Z",
"modified": "2018-03-13T13:34:56.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.179.129.46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-3938-4d9a-9d01-49a3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:57.000Z",
"modified": "2018-03-13T13:34:57.000Z",
"pattern": "[domain-name:value = 'recedatearecarrycopy.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-60c0-44ee-b5dc-4e03950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:57.000Z",
"modified": "2018-03-13T13:34:57.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '31.5.167.149']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9a98-4d9a-a9a8-44ac950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:57.000Z",
"modified": "2018-03-13T13:34:57.000Z",
"pattern": "[domain-name:value = 'redistributionsthefrom.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7a80-4976-b70d-4287950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:58.000Z",
"modified": "2018-03-13T13:34:58.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.107.108.249']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-fdec-419c-b6cb-447f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:58.000Z",
"modified": "2018-03-13T13:34:58.000Z",
"pattern": "[domain-name:value = 'reincorporationp.googleboobs45.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-94a4-4597-b5d6-45c7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:59.000Z",
"modified": "2018-03-13T13:34:59.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.107.95.128']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-8e2c-4a1e-98cd-440f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:59.000Z",
"modified": "2018-03-13T13:34:59.000Z",
"pattern": "[domain-name:value = 'reputablyz.francegirls.club']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c700-417b-bbb7-4f53950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:34:59.000Z",
"modified": "2018-03-13T13:34:59.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.143.160.70']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:34:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1ffc-4818-bafd-45e3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:00.000Z",
"modified": "2018-03-13T13:35:00.000Z",
"pattern": "[domain-name:value = 'responsibleworktermsthe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-faec-4219-b054-43b4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:00.000Z",
"modified": "2018-03-13T13:35:00.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.143.200.179']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-a290-4f3c-b86f-432f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:01.000Z",
"modified": "2018-03-13T13:35:01.000Z",
"pattern": "[domain-name:value = 'retroauricularp.megabulkmessage240.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2514-4768-a41c-4ac5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:01.000Z",
"modified": "2018-03-13T13:35:01.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.152.176.90']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-3eec-4336-8aee-4bb6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:01.000Z",
"modified": "2018-03-13T13:35:01.000Z",
"pattern": "[domain-name:value = 'royaldumps.cc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4bb8-40b9-8422-4eba950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:02.000Z",
"modified": "2018-03-13T13:35:02.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.152.180.138']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-b94c-4d72-b28e-42ba950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:02.000Z",
"modified": "2018-03-13T13:35:02.000Z",
"pattern": "[domain-name:value = 'royaldumps.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7004-4df9-8e55-4141950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:02.000Z",
"modified": "2018-03-13T13:35:02.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.196.158.76']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-3c44-4ab7-bf6a-4136950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:03.000Z",
"modified": "2018-03-13T13:35:03.000Z",
"pattern": "[domain-name:value = 'rtwjeuqwdyhqwdqwidjgha.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9770-4418-be49-472e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:03.000Z",
"modified": "2018-03-13T13:35:03.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.26.55.51']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-d38c-4302-9c09-4814950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:04.000Z",
"modified": "2018-03-13T13:35:04.000Z",
"pattern": "[domain-name:value = 'scottfranch.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ad48-4379-aa2c-48c8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:04.000Z",
"modified": "2018-03-13T13:35:04.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.60.136.83']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-5490-477a-b061-4e70950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:04.000Z",
"modified": "2018-03-13T13:35:04.000Z",
"pattern": "[domain-name:value = 'sdneewwewe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-cb54-4326-83ee-4a95950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:05.000Z",
"modified": "2018-03-13T13:35:05.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '37.60.136.94']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-cf54-41d8-a768-4a5a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:05.000Z",
"modified": "2018-03-13T13:35:05.000Z",
"pattern": "[domain-name:value = 'search.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e320-4f7b-a18e-433b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:06.000Z",
"modified": "2018-03-13T13:35:06.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.110.200.194']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-5f30-4275-be6f-41e8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:06.000Z",
"modified": "2018-03-13T13:35:06.000Z",
"pattern": "[domain-name:value = 'seeyouinnebqe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-17d4-4776-9a15-4ef7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:06.000Z",
"modified": "2018-03-13T13:35:06.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.221.163.203']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-df6c-4d72-9d5c-4d1b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:07.000Z",
"modified": "2018-03-13T13:35:07.000Z",
"pattern": "[domain-name:value = 'semicalcareousj.regbidom.pro']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2514-46fe-883f-42d1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:07.000Z",
"modified": "2018-03-13T13:35:07.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.221.163.211']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-506c-4e78-ad56-46c9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:08.000Z",
"modified": "2018-03-13T13:35:08.000Z",
"pattern": "[domain-name:value = 'shderivativepartawork.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-46a4-4411-86da-4f96950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:08.000Z",
"modified": "2018-03-13T13:35:08.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.226.17.116']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-bd20-41e3-87dd-4409950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:08.000Z",
"modified": "2018-03-13T13:35:08.000Z",
"pattern": "[domain-name:value = 'silksaajjha.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-71f8-434c-8dad-45f9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:09.000Z",
"modified": "2018-03-13T13:35:09.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.67.12.80']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-245c-40e0-bcb0-4da9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:09.000Z",
"modified": "2018-03-13T13:35:09.000Z",
"pattern": "[domain-name:value = 'sofpolokatos.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a710-4bd7-8b33-40c2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:09.000Z",
"modified": "2018-03-13T13:35:09.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.73.245.111']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9ad4-4014-937f-411d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:10.000Z",
"modified": "2018-03-13T13:35:10.000Z",
"pattern": "[domain-name:value = 'softwithininclma.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a76c-4198-9d9b-4be8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:10.000Z",
"modified": "2018-03-13T13:35:10.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '41.74.170.134']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-259c-46ca-b3b2-47df950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:11.000Z",
"modified": "2018-03-13T13:35:11.000Z",
"pattern": "[domain-name:value = 'solaciouslyy.bulkmessage-219.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b31c-4c3d-a9e5-42da950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:11.000Z",
"modified": "2018-03-13T13:35:11.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '45.115.112.10']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9188-4cee-acaa-4ef5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:11.000Z",
"modified": "2018-03-13T13:35:11.000Z",
"pattern": "[domain-name:value = 'solidaritiesn.bulkmessage-229.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c0c0-44fe-ae50-447a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:12.000Z",
"modified": "2018-03-13T13:35:12.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.10.0.124']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-e154-4faf-8485-4150950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:12.000Z",
"modified": "2018-03-13T13:35:12.000Z",
"pattern": "[domain-name:value = 'soliphonetheseinnovative.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c248-4404-8a08-4f8b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:13.000Z",
"modified": "2018-03-13T13:35:13.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.10.106.206']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-3ff8-4272-98f5-4bd7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:13.000Z",
"modified": "2018-03-13T13:35:13.000Z",
"pattern": "[domain-name:value = 'songlando.white-messages-242.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c240-4e5b-b24d-4a2c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:13.000Z",
"modified": "2018-03-13T13:35:13.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.102.10.202']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-b2ec-4c12-8401-427c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:14.000Z",
"modified": "2018-03-13T13:35:14.000Z",
"pattern": "[domain-name:value = 'sourceandwri.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d87c-440a-8aa3-40c1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:14.000Z",
"modified": "2018-03-13T13:35:14.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.102.10.77']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1dac-4883-ab4f-48b5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:15.000Z",
"modified": "2018-03-13T13:35:15.000Z",
"pattern": "[domain-name:value = 'sourcelicensethe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ddec-405a-82b8-413c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:15.000Z",
"modified": "2018-03-13T13:35:15.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.109.39.124']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-81c8-4af9-a246-435c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:15.000Z",
"modified": "2018-03-13T13:35:15.000Z",
"pattern": "[domain-name:value = 'sslmerchantability.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e3c0-4660-a13c-410a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:16.000Z",
"modified": "2018-03-13T13:35:16.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.139.176.124']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-f64c-4172-8fa1-41cf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:16.000Z",
"modified": "2018-03-13T13:35:16.000Z",
"pattern": "[domain-name:value = 'stackersi.message-services-239.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e354-4432-91c2-453d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:17.000Z",
"modified": "2018-03-13T13:35:17.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.139.176.151']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-85c4-4ec3-b9b3-4268950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:17.000Z",
"modified": "2018-03-13T13:35:17.000Z",
"pattern": "[domain-name:value = 'streams.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-eea0-470e-bf7c-4324950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:17.000Z",
"modified": "2018-03-13T13:35:17.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.171.66.235']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-0088-41a4-ae58-408c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:18.000Z",
"modified": "2018-03-13T13:35:18.000Z",
"pattern": "[domain-name:value = 'submolecularq.white-messages-225.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2fd4-4a41-9852-46a4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:18.000Z",
"modified": "2018-03-13T13:35:18.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.214.214.39']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-8704-4cd6-aea4-4c90950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:19.000Z",
"modified": "2018-03-13T13:35:19.000Z",
"pattern": "[domain-name:value = 'subrisoryk.bulkmessage-220.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-3ea4-4641-9271-4c04950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:19.000Z",
"modified": "2018-03-13T13:35:19.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.237.114.237']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1488-4500-9848-4bf4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:19.000Z",
"modified": "2018-03-13T13:35:19.000Z",
"pattern": "[domain-name:value = 'sukiebanieotbitesotnas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-28bc-4c72-954a-43db950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:20.000Z",
"modified": "2018-03-13T13:35:20.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.237.80.152']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-a9dc-4062-9cb6-469c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:20.000Z",
"modified": "2018-03-13T13:35:20.000Z",
"pattern": "[domain-name:value = 'sukiebuchnieohuelivobos.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2e2c-4ea9-9e10-4e2e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:20.000Z",
"modified": "2018-03-13T13:35:20.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.238.18.157']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-4444-4e5d-8094-4130950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:21.000Z",
"modified": "2018-03-13T13:35:21.000Z",
"pattern": "[domain-name:value = 'superendorsementw.wallirum.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1cf4-4c52-b0c1-4f72950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:21.000Z",
"modified": "2018-03-13T13:35:21.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.238.18.241']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-c228-4e78-866f-44a1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:22.000Z",
"modified": "2018-03-13T13:35:22.000Z",
"pattern": "[domain-name:value = 'technographerc.megabulkmessage224.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-23f4-4a45-8b49-49d7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:22.000Z",
"modified": "2018-03-13T13:35:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.249.70.243']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-49d0-47fe-b144-4c99950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:22.000Z",
"modified": "2018-03-13T13:35:22.000Z",
"pattern": "[domain-name:value = 'tetraodonm.message-services-218.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-c9a8-4b43-b9f8-4242950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:23.000Z",
"modified": "2018-03-13T13:35:23.000Z",
"pattern": "[domain-name:value = 'thatderivativeworks.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-13e8-41b1-b016-40e7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:23.000Z",
"modified": "2018-03-13T13:35:23.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.29.1.191']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1b04-45ae-b078-4423950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:24.000Z",
"modified": "2018-03-13T13:35:24.000Z",
"pattern": "[domain-name:value = 'theaaddendumrevisions.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1f98-4106-b94d-42e9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:24.000Z",
"modified": "2018-03-13T13:35:24.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.40.123.136']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-6f1c-4a0f-960e-4b42950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:25.000Z",
"modified": "2018-03-13T13:35:25.000Z",
"pattern": "[domain-name:value = 'theandwithinfareth.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-fc68-4d8c-af9b-4186950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:25.000Z",
"modified": "2018-03-13T13:35:25.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.47.105.160']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-bc2c-4812-9dea-48aa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:25.000Z",
"modified": "2018-03-13T13:35:25.000Z",
"pattern": "[domain-name:value = 'thedistributedderiv.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f364-46e9-8c12-44d3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:26.000Z",
"modified": "2018-03-13T13:35:26.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.47.98.128']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2818-41b8-8bfe-4410950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:26.000Z",
"modified": "2018-03-13T13:35:26.000Z",
"pattern": "[domain-name:value = 'thefordistributeprovided.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-eb8c-438c-ac2c-4b28950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:26.000Z",
"modified": "2018-03-13T13:35:26.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '46.55.145.49']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-7dc0-4b8d-a08f-40a0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:27.000Z",
"modified": "2018-03-13T13:35:27.000Z",
"pattern": "[domain-name:value = 'thetheandmetarefoll.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-df68-48ba-819c-4d05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:27.000Z",
"modified": "2018-03-13T13:35:27.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.104.188.117']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-bf7c-4517-b1a6-432e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:28.000Z",
"modified": "2018-03-13T13:35:28.000Z",
"pattern": "[domain-name:value = 'thislossmentioningope.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ee38-4e8c-83f0-4cad950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:28.000Z",
"modified": "2018-03-13T13:35:28.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.12.133.137']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2974-44dd-b799-45fb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:28.000Z",
"modified": "2018-03-13T13:35:28.000Z",
"pattern": "[domain-name:value = 'time.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ed68-4a18-8203-4551950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:29.000Z",
"modified": "2018-03-13T13:35:29.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '51.218.188.250']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-8818-462d-9ad3-45c7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:29.000Z",
"modified": "2018-03-13T13:35:29.000Z",
"pattern": "[domain-name:value = 'tmeansmderivinclusionent.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ffbc-4538-a36e-43ab950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:30.000Z",
"modified": "2018-03-13T13:35:30.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.12.190.128']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-ed60-42f8-aa71-4288950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:30.000Z",
"modified": "2018-03-13T13:35:30.000Z",
"pattern": "[domain-name:value = 'torskitnasdnewpppoany.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-00e0-440a-855c-4d18950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:30.000Z",
"modified": "2018-03-13T13:35:30.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.12.35.49']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-3944-4988-8d9f-4209950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:31.000Z",
"modified": "2018-03-13T13:35:31.000Z",
"pattern": "[domain-name:value = 'tradeherebymodifi.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f5e8-4303-b1d5-4049950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:31.000Z",
"modified": "2018-03-13T13:35:31.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.13.147.253']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-7c2c-46f7-8a47-4b5d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:32.000Z",
"modified": "2018-03-13T13:35:32.000Z",
"pattern": "[domain-name:value = 'tragedienness.message-services-235.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ea8c-4cec-b6dd-4d89950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:32.000Z",
"modified": "2018-03-13T13:35:32.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.20.124.103']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-d4f4-40d3-b62b-47d2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:32.000Z",
"modified": "2018-03-13T13:35:32.000Z",
"pattern": "[domain-name:value = 'trampersq.megabulkmessage204.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-fe70-4d3e-b613-4050950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:33.000Z",
"modified": "2018-03-13T13:35:33.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.204.138.23']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-051c-4716-af5c-43ff950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:33.000Z",
"modified": "2018-03-13T13:35:33.000Z",
"pattern": "[domain-name:value = 'tranasportnmme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ee64-43e5-91a0-45ff950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:34.000Z",
"modified": "2018-03-13T13:35:34.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.137.47']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-31c0-4df7-9430-495c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:34.000Z",
"modified": "2018-03-13T13:35:34.000Z",
"pattern": "[domain-name:value = 'trhanisnaormasndiqwe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-eb3c-4cfc-bb29-4c23950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:34.000Z",
"modified": "2018-03-13T13:35:34.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.142.196']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-8894-41f5-b564-4be3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:35.000Z",
"modified": "2018-03-13T13:35:35.000Z",
"pattern": "[domain-name:value = 'triethylaminep.megabulkmessage245.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-dbf8-4a4f-bddd-45ce950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:35.000Z",
"modified": "2018-03-13T13:35:35.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.201.193']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-c85c-4231-8c05-4d5d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:36.000Z",
"modified": "2018-03-13T13:35:36.000Z",
"pattern": "[domain-name:value = 'trondyfeveryfeellnas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e67c-4861-95e2-4fb8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:36.000Z",
"modified": "2018-03-13T13:35:36.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.238.18']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-043c-450d-b5ca-4d66950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:36.000Z",
"modified": "2018-03-13T13:35:36.000Z",
"pattern": "[domain-name:value = 'try2swipe.ws']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d6d4-42e3-9f04-42f1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:37.000Z",
"modified": "2018-03-13T13:35:37.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.2.241.209']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-55fc-4b8e-b609-4358950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:37.000Z",
"modified": "2018-03-13T13:35:37.000Z",
"pattern": "[domain-name:value = 'tutoragef.message-services-234.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e220-4eb4-96ff-48e7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:38.000Z",
"modified": "2018-03-13T13:35:38.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.53.140.195']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-fd70-4d44-88a9-426e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:38.000Z",
"modified": "2018-03-13T13:35:38.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.56.73.146']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-904c-4569-9898-4dee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:38.000Z",
"modified": "2018-03-13T13:35:38.000Z",
"pattern": "[domain-name:value = 'tuyngsdnfwefwef.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-15a0-4f39-be14-4f4c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:39.000Z",
"modified": "2018-03-13T13:35:39.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.8.11.155']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-d014-40cd-b016-4b8c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:39.000Z",
"modified": "2018-03-13T13:35:39.000Z",
"pattern": "[domain-name:value = 'uiunhdmansdsddsx.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2e98-4afa-a81c-479a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:40.000Z",
"modified": "2018-03-13T13:35:40.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.100.255.25']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-16e4-421d-b264-439e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:40.000Z",
"modified": "2018-03-13T13:35:40.000Z",
"pattern": "[domain-name:value = 'unclesam.ws']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2f58-4cba-bd99-4690950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:41.000Z",
"modified": "2018-03-13T13:35:41.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.121.111.127']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-4518-4ecc-bf3e-44f2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:41.000Z",
"modified": "2018-03-13T13:35:41.000Z",
"pattern": "[domain-name:value = 'undergenerals.bulkmessage-231.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4d64-4925-a452-48d5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:41.000Z",
"modified": "2018-03-13T13:35:41.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.231.108.213']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-81c0-47fd-8d85-4f96950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:42.000Z",
"modified": "2018-03-13T13:35:42.000Z",
"pattern": "[domain-name:value = 'unenslaveds.bulkmessage-238.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-746c-4db6-a80d-421b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:35:55.000Z",
"modified": "2018-03-13T11:35:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.61.60.204']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:35:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-ca20-4ace-99f7-481d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:42.000Z",
"modified": "2018-03-13T13:35:42.000Z",
"pattern": "[domain-name:value = 'unintellectualo.neospfsgear.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8530-48a0-9bcf-4e56950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:35:55.000Z",
"modified": "2018-03-13T11:35:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.61.60.204']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:35:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2090-46ad-a8f0-481d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:43.000Z",
"modified": "2018-03-13T13:35:43.000Z",
"pattern": "[domain-name:value = 'uniseriali.megabulkmessage218.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b660-40d8-b0a6-4788950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:43.000Z",
"modified": "2018-03-13T13:35:43.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.73.70.146']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9000-4f9d-9988-4d67950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:44.000Z",
"modified": "2018-03-13T13:35:44.000Z",
"pattern": "[domain-name:value = 'unposthumousm.bulkmessage-229.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b0e0-4196-bbbe-4802950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:44.000Z",
"modified": "2018-03-13T13:35:44.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '62.85.88.113']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-0e48-48ad-ae44-491f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:44.000Z",
"modified": "2018-03-13T13:35:44.000Z",
"pattern": "[domain-name:value = 'unprepossessingnessu.mailer-service230.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b90c-4f22-b63c-47a5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:45.000Z",
"modified": "2018-03-13T13:35:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.235.14.166']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-82cc-48d8-b438-4b9f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:45.000Z",
"modified": "2018-03-13T13:35:45.000Z",
"pattern": "[domain-name:value = 'unrequestedw.message-services-236.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c840-42f0-af39-4bfd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:46.000Z",
"modified": "2018-03-13T13:35:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.70.100.139']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-cfdc-4937-b85f-42e9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:46.000Z",
"modified": "2018-03-13T13:35:46.000Z",
"pattern": "[domain-name:value = 'unsacerdotallyk.bulkmessage-206.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c518-4443-9b2c-4c58950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:46.000Z",
"modified": "2018-03-13T13:35:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.70.124.174']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-4a3c-4bdd-a59c-4d22950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:47.000Z",
"modified": "2018-03-13T13:35:47.000Z",
"pattern": "[domain-name:value = 'upstrikez.francegirls.club']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c31c-4112-8706-4268950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:47.000Z",
"modified": "2018-03-13T13:35:47.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.81.21.110']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-c050-4226-b9a9-4d7b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:48.000Z",
"modified": "2018-03-13T13:35:48.000Z",
"pattern": "[domain-name:value = 'usedformsopensslofor.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d69c-4549-8ea5-4dbf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:48.000Z",
"modified": "2018-03-13T13:35:48.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.81.55.140']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-3344-44e1-8ef4-44cb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:48.000Z",
"modified": "2018-03-13T13:35:48.000Z",
"pattern": "[domain-name:value = 'vbnmfghoiuytrasdtoooasne.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-df2c-4433-8dcf-44f5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:49.000Z",
"modified": "2018-03-13T13:35:49.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '77.85.254.83']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-aae8-484e-8409-465f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:49.000Z",
"modified": "2018-03-13T13:35:49.000Z",
"pattern": "[domain-name:value = 'verified.vc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f504-4598-85ae-44a1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:50.000Z",
"modified": "2018-03-13T13:35:50.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.100.193.22']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1f6c-4088-b6fe-47e0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:50.000Z",
"modified": "2018-03-13T13:35:50.000Z",
"pattern": "[domain-name:value = 'verifyandmeet.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f2a4-4ada-9575-4fde950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:50.000Z",
"modified": "2018-03-13T13:35:50.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.171.93.223']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9a30-4810-9646-4a29950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:51.000Z",
"modified": "2018-03-13T13:35:51.000Z",
"pattern": "[domain-name:value = 'ver.sceinsheru.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1f88-4a5b-b41b-41af950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:51.000Z",
"modified": "2018-03-13T13:35:51.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.173.198.130']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-0810-4bbd-9b9c-4ed6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:52.000Z",
"modified": "2018-03-13T13:35:52.000Z",
"pattern": "[domain-name:value = 'visukisovsemohuelipadlieb.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-3a10-4d9a-9871-4d87950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:52.000Z",
"modified": "2018-03-13T13:35:52.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.28.210.44']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-8464-4b26-9ecc-4360950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:52.000Z",
"modified": "2018-03-13T13:35:52.000Z",
"pattern": "[domain-name:value = 'vnxirmdjasadadasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-62a8-4a56-a180-4e0f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:53.000Z",
"modified": "2018-03-13T13:35:53.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.28.210.62']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-817c-453e-affc-4226950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:53.000Z",
"modified": "2018-03-13T13:35:53.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.31.63.30']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1c10-4478-8a07-4a67950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:54.000Z",
"modified": "2018-03-13T13:35:54.000Z",
"pattern": "[domain-name:value = 'wdiqwdjhruaayyyyasdddd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-b7a4-4745-ae07-4eb2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:54.000Z",
"modified": "2018-03-13T13:35:54.000Z",
"pattern": "[domain-name:value = 'web.googlemehard.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8f84-40f3-85bb-452b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:54.000Z",
"modified": "2018-03-13T13:35:54.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.38.114.17']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b114-4b2a-97af-40c9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:55.000Z",
"modified": "2018-03-13T13:35:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.40.139.73']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-52d4-4302-a3c8-4299950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:55.000Z",
"modified": "2018-03-13T13:35:55.000Z",
"pattern": "[domain-name:value = 'weshelgoaouyntwany.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bb34-4c9b-81fd-4a22950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:56.000Z",
"modified": "2018-03-13T13:35:56.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.40.42.64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-cdec-417a-b3f7-4fb7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:56.000Z",
"modified": "2018-03-13T13:35:56.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.56.206.78']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-e058-4269-b215-4b0e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:56.000Z",
"modified": "2018-03-13T13:35:56.000Z",
"pattern": "[domain-name:value = 'windflawsm.dondigispfs.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-6670-42b5-a763-442d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:57.000Z",
"modified": "2018-03-13T13:35:57.000Z",
"pattern": "[domain-name:value = 'withadvertisingthe.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-be44-462c-9caf-4afe950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:57.000Z",
"modified": "2018-03-13T13:35:57.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.83.94.150']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9ca4-4a41-916c-4740950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:58.000Z",
"modified": "2018-03-13T13:35:58.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.84.159.213']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-01a0-4aed-87a5-4e91950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:58.000Z",
"modified": "2018-03-13T13:35:58.000Z",
"pattern": "[domain-name:value = 'withoutownworksinfrtrade.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-852c-437e-92fa-4c8c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:58.000Z",
"modified": "2018-03-13T13:35:58.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.90.107.166']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-5cc0-4fac-bace-4c6e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:59.000Z",
"modified": "2018-03-13T13:35:59.000Z",
"pattern": "[domain-name:value = 'withsaallwarranties.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5c84-416a-834f-4ffe950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:35:59.000Z",
"modified": "2018-03-13T13:35:59.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.90.243.124']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:35:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-c974-4a46-b6bb-4663950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:00.000Z",
"modified": "2018-03-13T13:36:00.000Z",
"pattern": "[domain-name:value = 'wknfolbmhngjdeee.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-68fc-4fbb-8345-4563950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:00.000Z",
"modified": "2018-03-13T13:36:00.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.93.238.148']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-4a78-4d49-8ecb-46f7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:00.000Z",
"modified": "2018-03-13T13:36:00.000Z",
"pattern": "[domain-name:value = 'wodmaiwdazzxss.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-731c-44db-b62d-41b8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:01.000Z",
"modified": "2018-03-13T13:36:01.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.96.179.201']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-f228-4204-be34-4bb6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:01.000Z",
"modified": "2018-03-13T13:36:01.000Z",
"pattern": "[domain-name:value = 'woeqqoaaasnegfds.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6c70-402c-ad96-470a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:02.000Z",
"modified": "2018-03-13T13:36:02.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.96.200.254']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-7714-483d-bc9a-4208950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:02.000Z",
"modified": "2018-03-13T13:36:02.000Z",
"pattern": "[domain-name:value = 'workrepresentatives.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6a74-426f-8476-408d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:02.000Z",
"modified": "2018-03-13T13:36:02.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.97.134.202']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-fd90-4fce-825e-4e74950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:03.000Z",
"modified": "2018-03-13T13:36:03.000Z",
"pattern": "[domain-name:value = 'wothetotheeither.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-76ec-494f-b9eb-4a73950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:03.000Z",
"modified": "2018-03-13T13:36:03.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.97.143.90']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9474-4905-b4a6-4541950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:03.000Z",
"modified": "2018-03-13T13:36:03.000Z",
"pattern": "[domain-name:value = 'woweoanafmzjvdqew.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-522c-4e04-8849-4594950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:04.000Z",
"modified": "2018-03-13T13:36:04.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.97.189.169']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2e78-4e45-994f-43b9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:04.000Z",
"modified": "2018-03-13T13:36:04.000Z",
"pattern": "[domain-name:value = 'wqoekwqejadfnbawd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-3988-41fe-846b-42e8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:05.000Z",
"modified": "2018-03-13T13:36:05.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.97.37.20']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-b364-437d-900a-4a65950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:05.000Z",
"modified": "2018-03-13T13:36:05.000Z",
"pattern": "[domain-name:value = 'www.aandeegnaeany.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1400-414f-a7a6-444a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:05.000Z",
"modified": "2018-03-13T13:36:05.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '78.97.64.138']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-4d04-43c6-b1da-48a5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:06.000Z",
"modified": "2018-03-13T13:36:06.000Z",
"pattern": "[domain-name:value = 'www.adojqnwdiqzxcqwdqwn.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-064c-41d2-89b4-446b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:06.000Z",
"modified": "2018-03-13T13:36:06.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.100.141.176']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-0bc0-4e4a-a9a8-45ff950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:06.000Z",
"modified": "2018-03-13T13:36:06.000Z",
"pattern": "[domain-name:value = 'www.arniytreegoogofastii.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d69c-452c-a43e-4b44950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:07.000Z",
"modified": "2018-03-13T13:36:07.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.100.54.64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-8eb8-406a-baaa-4588950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:07.000Z",
"modified": "2018-03-13T13:36:07.000Z",
"pattern": "[domain-name:value = 'www.asdljnoqwdnoqwdqwqwwqe.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b9ac-4f2e-a0f7-4e48950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:08.000Z",
"modified": "2018-03-13T13:36:08.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.112.132.28']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-0404-4a4a-a6c5-42c6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:08.000Z",
"modified": "2018-03-13T13:36:08.000Z",
"pattern": "[domain-name:value = 'www.bccxgddsiugjj.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ba6c-47f8-ae02-437c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:08.000Z",
"modified": "2018-03-13T13:36:08.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.112.140.180']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-7b44-4a03-a873-4897950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:09.000Z",
"modified": "2018-03-13T13:36:09.000Z",
"pattern": "[domain-name:value = 'www.cothenahudson.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bb2c-4681-b7b3-4b96950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:09.000Z",
"modified": "2018-03-13T13:36:09.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.112.164.104']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9c48-4ec0-8b50-401b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:10.000Z",
"modified": "2018-03-13T13:36:10.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.112.164.146']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2358-42c0-8587-4976950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:10.000Z",
"modified": "2018-03-13T13:36:10.000Z",
"pattern": "[domain-name:value = 'www.csh0p.ru']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6d60-4c08-a0e7-4527950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:10.000Z",
"modified": "2018-03-13T13:36:10.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.113.247.141']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-964c-4419-9f76-43a5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:11.000Z",
"modified": "2018-03-13T13:36:11.000Z",
"pattern": "[domain-name:value = 'www.cvvshop.lv']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-39c8-4dc7-b31e-416e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:11.000Z",
"modified": "2018-03-13T13:36:11.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.114.188.203']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1cc8-435f-9f2b-43cd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:12.000Z",
"modified": "2018-03-13T13:36:12.000Z",
"pattern": "[domain-name:value = 'www.diuhqioduqwdioqdhuqwd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-19b8-4820-b2c4-4ab4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:12.000Z",
"modified": "2018-03-13T13:36:12.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.114.8.130']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-9728-4c8b-bd10-4b13950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:12.000Z",
"modified": "2018-03-13T13:36:12.000Z",
"pattern": "[domain-name:value = 'www.foradocumentcontr.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1c14-45ef-8699-4aa2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:13.000Z",
"modified": "2018-03-13T13:36:13.000Z",
"pattern": "[domain-name:value = 'www.fqiwdkigjuiandasdasdj.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f430-4714-a593-4bb6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:13.000Z",
"modified": "2018-03-13T13:36:13.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.115.122.218']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-aa60-4547-a889-4250950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:13.000Z",
"modified": "2018-03-13T13:36:13.000Z",
"pattern": "[domain-name:value = 'www.hdclips111.xyz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c28c-4ef6-a819-4926950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:14.000Z",
"modified": "2018-03-13T13:36:14.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.115.24.255']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-4338-47b2-8fa3-459c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:14.000Z",
"modified": "2018-03-13T13:36:14.000Z",
"pattern": "[domain-name:value = 'www.jhijdqwughasndaseqw.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a8bc-4511-882f-4c7f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:15.000Z",
"modified": "2018-03-13T13:36:15.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.117.116.170']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-81a4-4b5d-8883-4b2d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:15.000Z",
"modified": "2018-03-13T13:36:15.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.117.52.225']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-ce64-40cc-93ce-435e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:15.000Z",
"modified": "2018-03-13T13:36:15.000Z",
"pattern": "[domain-name:value = 'www.kronashjeeeaqqforny.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-53e8-4efa-9872-494f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:16.000Z",
"modified": "2018-03-13T13:36:16.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.117.57.208']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-0850-42eb-ad14-4c8c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:16.000Z",
"modified": "2018-03-13T13:36:16.000Z",
"pattern": "[domain-name:value = 'www.mcduck.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1948-4988-a86b-4684950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:17.000Z",
"modified": "2018-03-13T13:36:17.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.118.196.1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-a4ac-4b62-896a-46ee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:17.000Z",
"modified": "2018-03-13T13:36:17.000Z",
"pattern": "[domain-name:value = 'www.mcduck.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2110-4782-b3ce-4cee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:17.000Z",
"modified": "2018-03-13T13:36:17.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.118.249.205']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-286c-49ae-a577-489b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:18.000Z",
"modified": "2018-03-13T13:36:18.000Z",
"pattern": "[domain-name:value = 'www.mnmnzxczxcasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1f78-411b-93f5-4b8b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:18.000Z",
"modified": "2018-03-13T13:36:18.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.118.252.138']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-e340-4c52-b9bc-4f06950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:18.000Z",
"modified": "2018-03-13T13:36:18.000Z",
"pattern": "[domain-name:value = 'www.nexiverifica.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1e44-426f-9cea-43a0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:19.000Z",
"modified": "2018-03-13T13:36:19.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.118.72.110']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-a3f0-4814-8997-4ea4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:19.000Z",
"modified": "2018-03-13T13:36:19.000Z",
"pattern": "[domain-name:value = 'www.njsjdnasbdwdd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-fab0-4ed5-b934-42b8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:20.000Z",
"modified": "2018-03-13T13:36:20.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.118.93.204']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-6888-483f-a659-4880950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:20.000Z",
"modified": "2018-03-13T13:36:20.000Z",
"pattern": "[domain-name:value = 'www.okljulihyjhg.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f080-4bef-aada-40c5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:20.000Z",
"modified": "2018-03-13T13:36:20.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.119.19.244']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-0548-41ef-93f1-4970950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:21.000Z",
"modified": "2018-03-13T13:36:21.000Z",
"pattern": "[domain-name:value = 'www.oooweqwnenwqew.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d9d0-42c3-bd8a-410b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:21.000Z",
"modified": "2018-03-13T13:36:21.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.119.238.211']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-7a94-4981-8fed-4a39950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:22.000Z",
"modified": "2018-03-13T13:36:22.000Z",
"pattern": "[domain-name:value = 'www.paysell.bz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d0cc-4dbb-9899-4128950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:22.000Z",
"modified": "2018-03-13T13:36:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.119.2.55']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1e5c-4466-85bf-4d1c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:22.000Z",
"modified": "2018-03-13T13:36:22.000Z",
"pattern": "[domain-name:value = 'www.paysell.ws']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c570-43dd-bdbb-47ea950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:23.000Z",
"modified": "2018-03-13T13:36:23.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.119.29.130']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-b0f4-4f9a-b002-4655950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:23.000Z",
"modified": "2018-03-13T13:36:23.000Z",
"pattern": "[domain-name:value = 'www.pomvgrnqqeetree.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b2a8-4180-9561-455d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:24.000Z",
"modified": "2018-03-13T13:36:24.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.119.37.226']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-17cc-447d-9e56-47fc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:24.000Z",
"modified": "2018-03-13T13:36:24.000Z",
"pattern": "[domain-name:value = 'www.pqwoemnzbtwv.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-867c-48f3-a474-49fc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:24.000Z",
"modified": "2018-03-13T13:36:24.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.121.73.1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-92f4-47b0-8c94-4a80950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:25.000Z",
"modified": "2018-03-13T13:36:25.000Z",
"pattern": "[domain-name:value = 'www.prvtzone.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8098-467c-bcef-405a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:25.000Z",
"modified": "2018-03-13T13:36:25.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.122.48.78']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-fa94-4368-af2b-45df950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:25.000Z",
"modified": "2018-03-13T13:36:25.000Z",
"pattern": "[domain-name:value = 'www.qojgnzogfezdniqbw.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5534-4e2a-8560-4d28950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:26.000Z",
"modified": "2018-03-13T13:36:26.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.122.51.228']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-7df0-40e1-bb47-4eaa950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:26.000Z",
"modified": "2018-03-13T13:36:26.000Z",
"pattern": "[domain-name:value = 'www.qpweouplmmojdaiq.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5ef0-435d-9379-44ff950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:27.000Z",
"modified": "2018-03-13T13:36:27.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.126.171.98']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-ee8c-4ae9-a3e7-46b4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:27.000Z",
"modified": "2018-03-13T13:36:27.000Z",
"pattern": "[domain-name:value = 'www.qwokqweijzxcsqwsxc.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5b64-471e-8ab8-4377950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:27.000Z",
"modified": "2018-03-13T13:36:27.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.126.172.127']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-7184-421b-be01-4f88950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:28.000Z",
"modified": "2018-03-13T13:36:28.000Z",
"pattern": "[domain-name:value = 'www.qwozijnbqbqqeybnbq.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-3b54-4e94-8419-4b5f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:28.000Z",
"modified": "2018-03-13T13:36:28.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.134.186.205']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-c8bc-4b5c-a69d-4e91950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:29.000Z",
"modified": "2018-03-13T13:36:29.000Z",
"pattern": "[domain-name:value = 'www.royaldumps.cc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1568-487d-aa1d-4ec3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:29.000Z",
"modified": "2018-03-13T13:36:29.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.185.201.203']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-2378-469e-80ad-4bc6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:29.000Z",
"modified": "2018-03-13T13:36:29.000Z",
"pattern": "[domain-name:value = 'www.rtwjeuqwdyhqwdqwidjgha.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f1d4-4ba3-b6bc-4748950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:30.000Z",
"modified": "2018-03-13T13:36:30.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.185.36.246']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-b548-4c17-b90a-4049950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:30.000Z",
"modified": "2018-03-13T13:36:30.000Z",
"pattern": "[domain-name:value = 'www.scottfranch.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d5ac-4e85-bc17-416a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:31.000Z",
"modified": "2018-03-13T13:36:31.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.185.40.67']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-1068-4cc8-b1ce-487e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:31.000Z",
"modified": "2018-03-13T13:36:31.000Z",
"pattern": "[domain-name:value = 'www.silksaajjha.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d158-46f3-a676-426d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:31.000Z",
"modified": "2018-03-13T13:36:31.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.185.9.220']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-8de8-4262-954d-4703950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:32.000Z",
"modified": "2018-03-13T13:36:32.000Z",
"pattern": "[domain-name:value = 'www.sukiebanieotbitesotnas.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5388-4fef-8bad-49ac950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:32.000Z",
"modified": "2018-03-13T13:36:32.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.187.179.186']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-0910-454b-a346-4442950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:32.000Z",
"modified": "2018-03-13T13:36:32.000Z",
"pattern": "[domain-name:value = 'www.thatderivativeworks.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b038-4852-a2de-440d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:33.000Z",
"modified": "2018-03-13T13:36:33.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.191.123.186']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-8dfc-4185-98db-4ebe950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:33.000Z",
"modified": "2018-03-13T13:36:33.000Z",
"pattern": "[domain-name:value = 'www.theandwithinfareth.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0ce8-4399-96a0-429d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:34.000Z",
"modified": "2018-03-13T13:36:34.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.191.126.31']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-0f64-4647-bca5-469e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:34.000Z",
"modified": "2018-03-13T13:36:34.000Z",
"pattern": "[domain-name:value = 'www.thedistributedderiv.net']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5d18-4692-88cb-4cb9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:34.000Z",
"modified": "2018-03-13T13:36:34.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '79.191.134.112']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-6f98-4720-8ac9-486b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:35.000Z",
"modified": "2018-03-13T13:36:35.000Z",
"pattern": "[domain-name:value = 'www.tranasportnmme.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e45c-4ddf-9220-445a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:35.000Z",
"modified": "2018-03-13T13:36:35.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.238.111.206']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-f038-48af-9493-4b1e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:35.000Z",
"modified": "2018-03-13T13:36:35.000Z",
"pattern": "[domain-name:value = 'www.try2swipe.org']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-63d0-4b46-bfb9-40a9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:36.000Z",
"modified": "2018-03-13T13:36:36.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.80.165.93']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-470c-48f7-98d0-4c32950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:36.000Z",
"modified": "2018-03-13T13:36:36.000Z",
"pattern": "[domain-name:value = 'www.try2swipe.ws']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e024-453c-bb8a-4ed7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:37.000Z",
"modified": "2018-03-13T13:36:37.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.82.28.34']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-c5b8-450f-a716-4b74950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:37.000Z",
"modified": "2018-03-13T13:36:37.000Z",
"pattern": "[domain-name:value = 'www.unclesam.tw']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5c14-43a5-b57c-4964950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:37.000Z",
"modified": "2018-03-13T13:36:37.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.98.187.85']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-277c-44fc-885f-4116950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:38.000Z",
"modified": "2018-03-13T13:36:38.000Z",
"pattern": "[domain-name:value = 'www.unclesam.ws']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a7f8-4645-baf5-46e8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:38.000Z",
"modified": "2018-03-13T13:36:38.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '80.99.221.229']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-829c-4cea-9070-45a3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:39.000Z",
"modified": "2018-03-13T13:36:39.000Z",
"pattern": "[domain-name:value = 'www.verified.vc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1894-4353-aa45-4998950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:39.000Z",
"modified": "2018-03-13T13:36:39.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.12.175.59']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-e780-4a6c-91bf-4224950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:39.000Z",
"modified": "2018-03-13T13:36:39.000Z",
"pattern": "[domain-name:value = 'www.vnxirmdjasadadasd.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6284-4954-837f-491d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:40.000Z",
"modified": "2018-03-13T13:36:40.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.16.13.42']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-4f84-4438-aa81-4789950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:40.000Z",
"modified": "2018-03-13T13:36:40.000Z",
"pattern": "[domain-name:value = 'www.weshelgoaouyntwany.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9a18-4e39-ae00-4bb9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:41.000Z",
"modified": "2018-03-13T13:36:41.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.180.117.175']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-efc8-4de8-aa73-448c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:41.000Z",
"modified": "2018-03-13T13:36:41.000Z",
"pattern": "[domain-name:value = 'yidunaxyi.top']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6298-46fb-a6f9-4ca9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:41.000Z",
"modified": "2018-03-13T13:36:41.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.182.29.38']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b781-6ce4-47de-8c6b-4aab950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:42.000Z",
"modified": "2018-03-13T13:36:42.000Z",
"pattern": "[domain-name:value = 'zavodchikshop.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ba98-460a-bede-4551950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:42.000Z",
"modified": "2018-03-13T13:36:42.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.183.229.39']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2bfc-4f5d-abda-4533950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:43.000Z",
"modified": "2018-03-13T13:36:43.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.192.225.36']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b408-4e7b-ad48-4e0c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:43.000Z",
"modified": "2018-03-13T13:36:43.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.198.24.9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2bac-4f53-b060-4fc6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:43.000Z",
"modified": "2018-03-13T13:36:43.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '81.214.129.181']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ba5c-47c4-bd14-4df8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:44.000Z",
"modified": "2018-03-13T13:36:44.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.114.65.50']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2c88-4909-bd88-43b7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:44.000Z",
"modified": "2018-03-13T13:36:44.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.114.68.102']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-91d0-4b33-a459-4555950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:44.000Z",
"modified": "2018-03-13T13:36:44.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.139.154.237']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f330-4937-a015-4f3a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:45.000Z",
"modified": "2018-03-13T13:36:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.208.161.228']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6368-4d1a-aac4-4acf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:45.000Z",
"modified": "2018-03-13T13:36:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.76.104.146']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ec3c-486c-9b23-4aac950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:46.000Z",
"modified": "2018-03-13T13:36:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.76.166.4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-411c-430b-b382-460a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:46.000Z",
"modified": "2018-03-13T13:36:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.76.238.254']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ad08-4d70-9f1e-44d3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:46.000Z",
"modified": "2018-03-13T13:36:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.77.200.208']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1f34-4b0d-8ed9-4766950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:47.000Z",
"modified": "2018-03-13T13:36:47.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.77.53.5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8350-4fe3-bb0d-4c85950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:47.000Z",
"modified": "2018-03-13T13:36:47.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.77.99.203']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-df9c-4258-9de8-4ea1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:48.000Z",
"modified": "2018-03-13T13:36:48.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.78.231.22']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4868-4df0-ba3a-4cc7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:48.000Z",
"modified": "2018-03-13T13:36:48.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.78.98.152']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d524-4b5f-92da-4467950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:49.000Z",
"modified": "2018-03-13T13:36:49.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '82.79.217.89']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4a0c-46d5-991b-4fb5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:49.000Z",
"modified": "2018-03-13T13:36:49.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '83.103.155.117']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-aef0-479b-bd38-423e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:49.000Z",
"modified": "2018-03-13T13:36:49.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '83.184.239.149']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1d98-4e3c-8003-431f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:50.000Z",
"modified": "2018-03-13T13:36:50.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '83.255.177.54']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8664-4fee-8ba9-4adf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:50.000Z",
"modified": "2018-03-13T13:36:50.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.0.189.15']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e24c-4a2f-955c-46c0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:51.000Z",
"modified": "2018-03-13T13:36:51.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.2.100.160']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5cac-4ce6-9bc6-402b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:51.000Z",
"modified": "2018-03-13T13:36:51.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.224.128.251']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-cc1c-48da-a6ba-4bf1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:51.000Z",
"modified": "2018-03-13T13:36:51.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.224.79.1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2b88-42d4-a029-4a6a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:52.000Z",
"modified": "2018-03-13T13:36:52.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.232.236.214']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a138-4036-8592-477e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:52.000Z",
"modified": "2018-03-13T13:36:52.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.232.240.210']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-efd8-4b32-9106-425d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:53.000Z",
"modified": "2018-03-13T13:36:53.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.255.244.213']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-30cc-4d95-a17e-4d10950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:53.000Z",
"modified": "2018-03-13T13:36:53.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.2.61.102']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e0b0-418b-915c-405a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:53.000Z",
"modified": "2018-03-13T13:36:53.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.54.160.150']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-52dc-45a9-8662-47d0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:54.000Z",
"modified": "2018-03-13T13:36:54.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '84.54.187.24']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ad34-4f77-9c05-4a96950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:54.000Z",
"modified": "2018-03-13T13:36:54.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.105.136.98']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1538-4451-834a-4164950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:55.000Z",
"modified": "2018-03-13T13:36:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.105.167.110']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8b4c-42c1-99dd-4cf7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:55.000Z",
"modified": "2018-03-13T13:36:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.105.40.76']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-efcc-45d1-87d1-4883950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:55.000Z",
"modified": "2018-03-13T13:36:55.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.122.4.26']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4574-41a2-b843-493f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:56.000Z",
"modified": "2018-03-13T13:36:56.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.122.4.34']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-97fc-4e40-8802-4b4e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:56.000Z",
"modified": "2018-03-13T13:36:56.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.186.132.136']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-da80-4112-bdaf-496b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:57.000Z",
"modified": "2018-03-13T13:36:57.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.187.46.16']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-272c-4d6a-99ed-4fa8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:57.000Z",
"modified": "2018-03-13T13:36:57.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.187.48.16']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7f90-4c7b-ac55-4b56950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:57.000Z",
"modified": "2018-03-13T13:36:57.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.196.145.46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e348-4d6d-819b-4e56950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:58.000Z",
"modified": "2018-03-13T13:36:58.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.204.62.71']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4c78-4855-86bd-4dfe950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:58.000Z",
"modified": "2018-03-13T13:36:58.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '85.206.221.28']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ad74-4c3a-8f1e-495e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:59.000Z",
"modified": "2018-03-13T13:36:59.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.101.230.109']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e3dc-4071-8f58-4a73950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:59.000Z",
"modified": "2018-03-13T13:36:59.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.101.99.100']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-3858-422d-bd6e-415c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:36:59.000Z",
"modified": "2018-03-13T13:36:59.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.104.75.4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:36:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b574-4a53-9f44-4dcb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:00.000Z",
"modified": "2018-03-13T13:37:00.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.106.200.105']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-fe9c-46cd-a8c3-4444950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:00.000Z",
"modified": "2018-03-13T13:37:00.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.107.101.21']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6ce0-4f63-8066-498d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:01.000Z",
"modified": "2018-03-13T13:37:01.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.120.13.153']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e09c-4f0e-8084-4c9e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:01.000Z",
"modified": "2018-03-13T13:37:01.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.120.14.155']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-13e4-4fe4-88bd-4650950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:01.000Z",
"modified": "2018-03-13T13:37:01.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.120.168.154']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5348-460a-af1f-4f42950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:02.000Z",
"modified": "2018-03-13T13:37:02.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.120.77.221']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b0c0-44ab-b4b1-4502950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:02.000Z",
"modified": "2018-03-13T13:37:02.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.0.5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-06cc-43d0-a2fa-4174950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:03.000Z",
"modified": "2018-03-13T13:37:03.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.13.229']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5ecc-4193-bee1-4c48950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:03.000Z",
"modified": "2018-03-13T13:37:03.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.174.165']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c090-4e22-814c-4038950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:03.000Z",
"modified": "2018-03-13T13:37:03.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.186.143']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1638-4aae-bf8b-4995950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:04.000Z",
"modified": "2018-03-13T13:37:04.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.20.39']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6794-4382-a1aa-41ca950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:04.000Z",
"modified": "2018-03-13T13:37:04.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.121.4.37']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c37c-4227-a755-4ed8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:04.000Z",
"modified": "2018-03-13T13:37:04.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.122.123.246']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1ab4-4bbf-9f9d-40c0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:05.000Z",
"modified": "2018-03-13T13:37:05.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.122.138.252']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-8448-4dcc-b6e1-4476950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:05.000Z",
"modified": "2018-03-13T13:37:05.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.124.188.212']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e030-42a2-878a-4bcb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:06.000Z",
"modified": "2018-03-13T13:37:06.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.124.199.122']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-51f8-44d2-bbb2-4d11950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:06.000Z",
"modified": "2018-03-13T13:37:06.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.124.61.73']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bcb8-4ec9-a197-4b54950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:06.000Z",
"modified": "2018-03-13T13:37:06.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.125.235.29']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-42d0-4a24-b025-49d1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:07.000Z",
"modified": "2018-03-13T13:37:07.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.126.122.155']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b0b0-4af0-994a-4264950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:07.000Z",
"modified": "2018-03-13T13:37:07.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.126.136.160']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-165c-4e80-aba2-4af2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:08.000Z",
"modified": "2018-03-13T13:37:08.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.126.98.134']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-48dc-4952-9ae3-4e9c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:08.000Z",
"modified": "2018-03-13T13:37:08.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.127.189.40']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-83f4-4bee-90ba-4b51950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:08.000Z",
"modified": "2018-03-13T13:37:08.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '86.61.72.96']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c998-4445-b7bf-489a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:09.000Z",
"modified": "2018-03-13T13:37:09.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.116.79.183']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0ed8-4fe1-b724-477d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:09.000Z",
"modified": "2018-03-13T13:37:09.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.119.100.220']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-41bc-45ac-ad23-4786950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:10.000Z",
"modified": "2018-03-13T13:37:10.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.120.51.58']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-60b4-4833-b7b8-42e7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:10.000Z",
"modified": "2018-03-13T13:37:10.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.121.163.217']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a658-408c-a179-4f17950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:10.000Z",
"modified": "2018-03-13T13:37:10.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.121.172.134']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0628-449a-8771-49be950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:11.000Z",
"modified": "2018-03-13T13:37:11.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.248.65.249']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6ef4-4d20-bbe6-47ed950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:11.000Z",
"modified": "2018-03-13T13:37:11.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.97.233.173']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f890-4dd1-a950-4ac9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:12.000Z",
"modified": "2018-03-13T13:37:12.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.97.240.199']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6738-415f-b93e-43f7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:12.000Z",
"modified": "2018-03-13T13:37:12.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '87.97.250.231']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d194-4485-94a5-4d9e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:12.000Z",
"modified": "2018-03-13T13:37:12.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.201.27.209']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1738-43a3-8a37-406d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:13.000Z",
"modified": "2018-03-13T13:37:13.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.203.215.122']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6574-4389-8986-4eb2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:13.000Z",
"modified": "2018-03-13T13:37:13.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '88.85.104.188']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b2e8-450a-a5e2-4ba9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:14.000Z",
"modified": "2018-03-13T13:37:14.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.133.197.60']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-df8c-499d-8245-4088950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:14.000Z",
"modified": "2018-03-13T13:37:14.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.133.234.3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-14c8-4a3d-8025-4556950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:14.000Z",
"modified": "2018-03-13T13:37:14.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.133.235.220']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-493c-4e1a-aa90-451e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:15.000Z",
"modified": "2018-03-13T13:37:15.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.136.133.219']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7838-485c-87b1-49d3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:15.000Z",
"modified": "2018-03-13T13:37:15.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.136.145.11']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ab80-4bd4-ab08-404a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:15.000Z",
"modified": "2018-03-13T13:37:15.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.137.155.23']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-dff4-4c58-b363-4075950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:16.000Z",
"modified": "2018-03-13T13:37:16.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.137.216.179']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1c38-4286-9e94-42d9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:16.000Z",
"modified": "2018-03-13T13:37:16.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.17.225.163']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-843c-490e-98e8-4cec950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:17.000Z",
"modified": "2018-03-13T13:37:17.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.176.122.31']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c4cc-4e5f-809f-499e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:17.000Z",
"modified": "2018-03-13T13:37:17.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.190.74.198']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-33d8-4567-bfd6-4cc6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:17.000Z",
"modified": "2018-03-13T13:37:17.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.215.156.62']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bcac-4964-9e64-46b6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:18.000Z",
"modified": "2018-03-13T13:37:18.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.215.173.163']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5714-45db-8816-4c79950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:18.000Z",
"modified": "2018-03-13T13:37:18.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.232.36.2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f244-45da-8e9c-49b7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:19.000Z",
"modified": "2018-03-13T13:37:19.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.238.207.5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4aa8-4b56-ba2c-418c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:19.000Z",
"modified": "2018-03-13T13:37:19.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.253.160.219']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bd9c-4337-953c-4d1a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:19.000Z",
"modified": "2018-03-13T13:37:19.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.44.244.88']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-28c0-4cd3-b965-48f5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:20.000Z",
"modified": "2018-03-13T13:37:20.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.45.19.18']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9bb4-44d8-8312-45a9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:20.000Z",
"modified": "2018-03-13T13:37:20.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.45.19.26']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-028c-417d-8c10-4a52950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:20.000Z",
"modified": "2018-03-13T13:37:20.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.46.25.58']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6770-44bc-8fc1-468d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:21.000Z",
"modified": "2018-03-13T13:37:21.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '89.47.94.113']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-e5b8-4721-acfa-4236950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:21.000Z",
"modified": "2018-03-13T13:37:21.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.141.227.102']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5140-4f76-9d6e-4bd8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:22.000Z",
"modified": "2018-03-13T13:37:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.144.250.165']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b5c0-46d4-bd31-4949950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:22.000Z",
"modified": "2018-03-13T13:37:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.148.230.87']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-3408-4298-a6f2-4099950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:22.000Z",
"modified": "2018-03-13T13:37:22.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.154.142.173']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9824-416c-a62f-494b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:23.000Z",
"modified": "2018-03-13T13:37:23.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.154.221.90']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-06cc-4724-96d9-4b09950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:23.000Z",
"modified": "2018-03-13T13:37:23.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.177.80.171']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6ed0-4a99-bfd7-4bac950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:24.000Z",
"modified": "2018-03-13T13:37:24.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.180.1.23']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b668-4574-bfdb-4bc2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:24.000Z",
"modified": "2018-03-13T13:37:24.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.228.198.7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0760-40ea-a39b-476e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:24.000Z",
"modified": "2018-03-13T13:37:24.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '90.230.88.30']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-608c-460a-933e-4f1b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:25.000Z",
"modified": "2018-03-13T13:37:25.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.139.147.93']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a824-436a-91f2-482c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:25.000Z",
"modified": "2018-03-13T13:37:25.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.139.175.76']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1410-447b-bfdb-4579950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:26.000Z",
"modified": "2018-03-13T13:37:26.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.139.190.217']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-63dc-4021-81a1-4cce950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:26.000Z",
"modified": "2018-03-13T13:37:26.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.139.196.113']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9c38-4f2c-87e8-4b60950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:26.000Z",
"modified": "2018-03-13T13:37:26.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.139.200.135']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c6e8-47e3-a82b-4569950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:27.000Z",
"modified": "2018-03-13T13:37:27.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.187.102.198']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1a38-4c26-bbf6-4107950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:27.000Z",
"modified": "2018-03-13T13:37:27.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.196.8.41']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7044-4cba-ad57-496f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:28.000Z",
"modified": "2018-03-13T13:37:28.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.201.175.46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c77c-48a5-a390-460a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:28.000Z",
"modified": "2018-03-13T13:37:28.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '91.83.171.131']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-18d8-47a6-9fee-460f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:28.000Z",
"modified": "2018-03-13T13:37:28.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.114.91.163']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-78a8-4dd2-a8e3-44ed950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:29.000Z",
"modified": "2018-03-13T13:37:29.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.247.143.70']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-bbf4-4e9c-b783-42c8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:29.000Z",
"modified": "2018-03-13T13:37:29.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.247.149.150']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ded4-4ac4-8bbe-4896950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:30.000Z",
"modified": "2018-03-13T13:37:30.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.249.248.25']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-f46c-4225-9f90-499d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:30.000Z",
"modified": "2018-03-13T13:37:30.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.52.201.19']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-4dfc-4178-80d2-4dc5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:30.000Z",
"modified": "2018-03-13T13:37:30.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.55.66.212']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c21c-443a-bea8-4ffb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:31.000Z",
"modified": "2018-03-13T13:37:31.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.55.95.123']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0c70-4a24-a705-4adb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:31.000Z",
"modified": "2018-03-13T13:37:31.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '92.81.118.230']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5980-40ff-985e-4644950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:31.000Z",
"modified": "2018-03-13T13:37:31.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.103.166.70']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ae60-4521-b27b-4650950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:32.000Z",
"modified": "2018-03-13T13:37:32.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.114.137.237']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-ccf4-413d-9a54-43b0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:32.000Z",
"modified": "2018-03-13T13:37:32.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.114.141.183']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-2df0-4dda-9ec7-45a8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:33.000Z",
"modified": "2018-03-13T13:37:33.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.114.82.80']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-920c-4f49-8be9-4ef1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:33.000Z",
"modified": "2018-03-13T13:37:33.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.118.206.238']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-fa74-4f3f-891d-4ba5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:33.000Z",
"modified": "2018-03-13T13:37:33.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.140.77.202']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7ab0-45e3-9001-4124950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:34.000Z",
"modified": "2018-03-13T13:37:34.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.152.165.187']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-d184-4d27-b0d5-4352950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:34.000Z",
"modified": "2018-03-13T13:37:34.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.152.213.129']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-30f0-4e47-9dca-4468950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:35.000Z",
"modified": "2018-03-13T13:37:35.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '93.190.144.113']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-82b0-4157-9b6a-419b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:35.000Z",
"modified": "2018-03-13T13:37:35.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.155.67.156']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-b33c-4490-9d3f-49f7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:35.000Z",
"modified": "2018-03-13T13:37:35.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.156.156.88']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0f88-449d-9046-4556950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:36.000Z",
"modified": "2018-03-13T13:37:36.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.190.179.160']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-6850-4f09-9814-4c19950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:36.000Z",
"modified": "2018-03-13T13:37:36.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.190.187.35']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c8e8-4c3f-8d37-4404950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:37.000Z",
"modified": "2018-03-13T13:37:37.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.240.222.57']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1788-4cba-b5b6-48a7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:37.000Z",
"modified": "2018-03-13T13:37:37.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.248.185.198']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-52a0-42f5-a575-4342950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:37.000Z",
"modified": "2018-03-13T13:37:37.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.248.186.242']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-a1a4-4061-b6c1-4001950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:38.000Z",
"modified": "2018-03-13T13:37:38.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.30.173.178']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0c00-4fd0-9d78-481d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:38.000Z",
"modified": "2018-03-13T13:37:38.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.52.3.239']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-526c-42e9-9a30-43cb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:38.000Z",
"modified": "2018-03-13T13:37:38.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '94.52.98.240']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c3d0-4241-99d9-40e3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:39.000Z",
"modified": "2018-03-13T13:37:39.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.104.121.111']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-1978-462e-89be-4991950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:39.000Z",
"modified": "2018-03-13T13:37:39.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.111.66.122']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-75c4-43fc-b6dc-4312950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:40.000Z",
"modified": "2018-03-13T13:37:40.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.111.89.26']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-c978-45ea-b917-4c8b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:40.000Z",
"modified": "2018-03-13T13:37:40.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.140.195.178']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0cc4-4f58-a571-4b66950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:40.000Z",
"modified": "2018-03-13T13:37:40.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.158.162.200']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-5330-433a-809d-4cbd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:41.000Z",
"modified": "2018-03-13T13:37:41.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.168.60.247']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7f0c-4046-b2af-43b9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:41.000Z",
"modified": "2018-03-13T13:37:41.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.170.220.66']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9ff8-496e-8c4e-4cee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:42.000Z",
"modified": "2018-03-13T13:37:42.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.218.137.178']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-0478-44a9-b00e-48a7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:42.000Z",
"modified": "2018-03-13T13:37:42.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.218.187.170']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-7190-4de0-b7db-4a3f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:42.000Z",
"modified": "2018-03-13T13:37:42.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.42.141.107']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79b-9ca4-48d9-8af5-4b26950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:43.000Z",
"modified": "2018-03-13T13:37:43.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.43.11.180']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79c-0c9c-451d-8b8c-4ca5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:43.000Z",
"modified": "2018-03-13T13:37:43.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.65.55.191']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79c-3e54-4cbb-bd9b-42b3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:43.000Z",
"modified": "2018-03-13T13:37:43.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.65.95.105']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79c-95f0-456c-b801-400c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:44.000Z",
"modified": "2018-03-13T13:37:44.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.68.55.82']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79c-deb4-4836-941e-465f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:44.000Z",
"modified": "2018-03-13T13:37:44.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.76.132.131']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79c-5dc4-42c4-93fc-416f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:45.000Z",
"modified": "2018-03-13T13:37:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.76.133.24']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79c-c62c-485a-83be-4943950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:45.000Z",
"modified": "2018-03-13T13:37:45.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.76.175.134']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79c-3790-44d2-8484-4057950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:46.000Z",
"modified": "2018-03-13T13:37:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.77.15.228']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b79c-6df8-4055-88ad-45ee950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:46.000Z",
"modified": "2018-03-13T13:37:46.000Z",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '95.87.213.225']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-2458-41f1-a93d-452a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '00e3bcfd0ef917c73c5a3818daf5bc0271fb3da53817df1215c20bfa5e4e91da']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-6200-46b8-9fed-4685950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '01b3d5de0e7c80516811276c31c2ba5d10020f04a7f7be5517c0fb2f452b8fcc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-80cc-4aec-89a3-48ff950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '0390956e3c62dad776147b6661fc5dbcd8d585027f7fd530e7b0428007b43197']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-7694-4386-807a-4751950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '041ad28cf8a6c03953910ea6dec3987ffd4daf729cce2a87e9bf68c480c0918e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-98a4-4465-8d20-4d23950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '04a320fac7e255e0cc08635abae96241944d9f0ecd0d57953447c7616ad9fbe8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-48a4-4eb1-b189-4630950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '04b7d38fa77396c75adfbb91e7efc725e97bbe673f575b42862031c1039dbdd2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e4b8-4d8a-b177-47da950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '07b4420172aded36c50bc312fbb22779ee8f166a28b0ae6a2e38fdcde8e37317']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-0f84-4900-9e64-4f43950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '0871d285f67c78a38e6713aeb7b1d76f8777d1d3a5479ed81e543ebcca54a1fe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-5054-4c77-9282-46d7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '0b2428609aabb06f4379d5cd50e696147f824f4c7724e826064abe9368f5c76d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e520-48c3-8533-4949950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '112a5ebecf43d35c9e196e49dedd8c7763bc8d05b175383303f7ae81b3e90a16']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-43e0-4fda-989d-4e05950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '1252053029722400e9f8115ad0b33235c642fbc7bbb96cf0c0d02c51d3426ae0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e0bc-4e77-8ac2-452e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '14284152d53c119ad04c986a2a115485ae480d8012603679bf28ec27e3869929']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-cce4-4ca9-bb12-40cf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '15ab4446504c9510fe377fb8657f9b4b67935c2aedd725058c1a15bf446a4015']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-8e14-474d-aa40-4409950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '15cc66021a04a4667e58ca9a7c8b9382dac1dd5869c788ceae47642454472b3f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-42c4-4936-9679-47b2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '1770d63f6ca452aa3afe77690c956fbbb0d5ae186fc82c0d14730820f9b7bb6c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-2e88-47be-a987-4764950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '18a10852b14df97b69243b38b23a573cc89d7629115ee0fefbbd66a00078ea4f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-1b14-4f77-bf18-4880950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '19212bfe27243227b15d7fb9e454d2c624e5d6cf847b8750a4a9b5ad55aec14d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-ce34-4b37-ac9f-4c65950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '194845f61ff81aa9000b3df9f0513b737941c1eac444b5457bcb9a0f772f8b34']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-6e94-41a8-8d09-477c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '19699d486840e392aa9b9630ab5df16233cca09230d7da30b60bb60cf973150c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-c908-47bd-97ce-44b5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '1c41511f967771ab8fbd4c96a857637efbb88b4d86d180c7bbd31fc748890d27']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-7990-4354-869d-4b48950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '1c980aba3c079b000d2a3c3431aaae37a34949d40c6e4d41721d06b53983d6d5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-4e90-4969-908f-43f6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '1fe5990f49535a312c2067188aad878933a778a7d4d7d4724d08a5637a72b9d0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-637c-44b8-b741-422a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '238ea3cc12020ad483279d363de6755d96a1fb2347b7d1815bb581514f2e9d9e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e860-40e5-b4b4-4980950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '23b4a46ddb5f904cd8c0a8b8eebfc623380a587a53c79469fd24b1724401fa0f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-71f4-470b-b0cf-43d1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '241658e90abf3416d97bfeff1e194d03d3103a7b07670b56420b4b4b61308b84']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-3f80-4eda-8b44-4f4c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '243b07e5f9880d126932a65ec2db49adef323b87a36ff91e6d2f811add6601d9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-c870-4ff8-8d3f-4efe950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '24829d1c8611a0ac01fc8139fbda91f52e76da46b9219044f70917c03b186be6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e400-4b2b-9a3a-47b3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '24d67b732f5d7ef320f1ab4a301fa9bf610dd9a831926f0cde8d4bae1c286700']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-ce18-4cca-9953-4d99950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '258513db7949cd16330a90b2d46925768631bb54769c8d43dcfe3bf0b2617ab1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-7478-4269-aca3-4ed0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '272c9c24b43e879d75da6c9b308510c80ce989101e5fd221843d6e35ce442191']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-1410-4870-942d-4441950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '275136e4983e309d584ec088ee369634b3761fef163a8e6cce709699775d9ac9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-b218-4b2f-993f-4aca950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '286011ba8c7e9f16b219d3919eeaa625391446525fab30d7adb532957003304a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-32d4-478a-95c8-4e75950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '2b4b4ead7f8a7b11e126d8c6a4199163e8debe33ea3a0b86bba78f92a6ee1740']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-d208-4096-bbf2-4e8e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '2f10286e313d0131b6a15d943ab91f0398287159f200f1c4774a095dfb979ff8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-3064-4b26-8370-4f60950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '30459539ca6f322c7f8a395092211df50361e834c5da0e3734c62eacf69afaad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-7818-4202-aac3-431c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '31ab3210c37c18a594478fcf466a7d9438d44155e4a6d0ff06e2df1f9496384c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-b734-4958-8d65-491f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '3342a7b78e6e3cd56c7abd51e1c66f94cf37fd5ec8fc7eef2c8905b00f96d69c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-a978-4c59-b92c-40fb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '36ded192ad393efe6ede239ec44f3f92457ff3647a1c3f87eabc859db52c9575']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-d078-4459-854b-4076950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '379c6ededb129c04d6cb3feb76bae8f403e12c2309cc0b26514ced95e154be0d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-fdb8-4c15-9f62-46d8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '38a80f5c92fa7444b757f8cba214ab7db7b4a57a38a432f56a0aaba7e80c692c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-2fa8-4d0a-8faf-4bac950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '39fb5a2659b013894366ae3620a74ff5eb381e39c15ea76d148a93a9b43a5aeb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-2d00-433d-8912-4f16950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '3b48246dc4b173a48a8fc04fcd4809fae45b8c73b0d33caa7052ef4b327fcbec']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-8e7c-4055-9ac3-4ccc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '3d7b183262dc42e6efd8d0c30bc6528c8f3847cb6b6c633b211e18fe4a9723eb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e3dc-4ca1-8e7b-4997950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '3e0c7e9f5acd8022624325492ab52fbe9df08f03cba21f137d5feb12185a2a3b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e774-4704-8be7-4e92950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '3e170b6d3f4ae8a2a101dfdf1e7a0947e715992256c16087f43d268b2de7cece']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-ec38-4b24-8f42-4d1b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '3e6b779c02e528436709c1873f5282453326c2f6ef1b9c4e1f6ff8f868728d80']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-f160-49b2-94df-48b9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '4348b3da8a0a9df56a6a218f8ece0b313a04eb85446c58a2d5d0061baa5754f9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-0e5c-4eee-8616-49da950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '437f7e76026b069fd1a25f633f250418792c77e94f77cc2bb7b6d03b897b17b0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e4a4-4d3e-aa89-44d7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '47d573c96a36966d4074d77855d64cdf8b977e6cae63c232cc477e622c60adec']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-b128-4200-b1f2-4343950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '4cb074da79840e68901060afb79029b8eedd2ea6c803eb0c44dd46bad2cd4b45']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-8770-42d0-92e7-4b1b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '4d9ea1cb63d187e1cddf0085a80944903e9e020f54cbeed5674b304ed4c664a7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-519c-4368-b51e-4ef4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '4e6d9c92c20174b07a6582b5dcc862536fbdce1a5964340dc5b238b3885985d2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-2334-43c7-b708-4c42950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '4f3cfee867adf239e4637a845b991edd4e523aa525101875492273f913013a56']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e144-4952-85cf-463c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '50de5d472ca4336f21c1c54eddfac7da2dcb2b0062cb82bc23232af51488f48c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-86b8-41bb-859b-4866950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '528bcdce7e1fc467c414267d8ab1cd0022071bc4ca304d2cbb90446f2540d799']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-33fc-4662-af5a-43b8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '5328e6cc453209eea9a2dc41e0ef19516794a5cebf90c6094acc581b8fbfe966']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-1728-4bea-b816-4296950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '538da0b115ebfa2e0b8d80f0dcfaf464afeff8f7dacb8d2db0d5938473704f64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-bb70-4553-854c-436a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '56bfcdd6d4fa3414ddeaefedbae3d5c1914f2d183c69ffff70929dfee80a0d8e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-6530-45b2-acaa-4e20950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '5b78f940c8376754517bfab8ca6ec1ebf978e5d32deef002a1715b39646a3407']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-c2c4-486a-b144-4969950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '5d15801241768974654ef7f4bb2e5914a6fbf9b628421a237c64bd6031949a1a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-2120-4bf5-a3d3-478d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '5d902968cb85bfa17f280d8b4ab9757b650760638f39ed43301053f67b67c5fe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-7874-48f0-94d2-44d8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '5dd05cc4deff26be3bce97a0814a1513080e1579021eea6771b2a9842050eb80']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-d540-4665-a892-45ac950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '620cf704d9930328729fd66be9c83f6db33088199a60a02315110bd757c13ef7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-3e28-4a55-aa7a-4b81950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '623d2a5e4bc341c96d7b1dbeaa448fe54616d1f2d62c51e46df3d066308fb904']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-9edc-48da-911e-4b09950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '62e3f58ec80fac52b6d1c12b17254c254b5113a70e8510df7b9bd49314aec00f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-d498-4c0e-a6c5-4182950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '644bab0b1aee8016d3c11a5112b80f7d9522203bbfb9b04218a13c95920aa185']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-70ac-43cb-91e6-4b53950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '659842f05b708a081d9f1e47317dcd1c5e4ffc09d00c3cb9a06de966ff429839']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-3114-46b3-a294-4523950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '67295af71bb23da8e045537784bd5af5ca7ad4aa742517a022022e9142e38a14']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e880-4668-8db6-4fb5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '6cf02af30b8a304b565da539a6222033a6240a33aba013105a44dd77e0508faf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-9fec-44da-a37a-44b7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '6e91eb5fbf5962ddd24011d73998d9c005779c32d8a763b57a5ffab0348a265f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-62ac-4ae7-8293-4fd2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '710439f33705307e2cde051bbdf446acfad8fd94a14be5c75b8350006b3a8d6a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-2ecc-4e0b-bd4c-4f06950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '71b283a465e11cc51c5e6c2358c146ee2263c79c602efd12433e7abcab5d8934']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-0af0-417d-8069-4f8c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '7210f0314f4814b28c2157e10d4ffdb10bd575dab6b93c90027820e16e2b109d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-071c-4698-b7b3-4aa0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '77482b48f56ef3a4132b52fb70432634b58ec165191fbcfbf9a0cbfbd1bccad5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-09ec-4ff5-a4ec-42b2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '7a2629e3505686c623cc001e684a95652b8ad7b8a8a697a106c116acdc25e421']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-7ef0-433e-8c5f-4e86950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '7aee0d6cba97a15b3b86b5be47b741dedc718fdcc6975a37875ce9de5db437fe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-af98-4b7a-a04c-4d93950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '7dc0eb78c2d5c8d7a07df541df4766620f68e28e06778c5a6ed70438c9f24499']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-0cc8-4119-b63f-4e32950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '7e0bea576dcde7384084a7e8754876a75ee3db4711c30d28585e157d9827b13d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-5be8-4b69-91e1-4eb9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '7e10cc1030d10939aa05cbd498f74381e0770fa5418b574c42fa9628003d5fdd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-0030-4b96-8a3e-4945950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '7e1fa4807e9314f54b8c59d1fe9745412566b7c2d4fbcbef8078782d96f4e10b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-aa54-433e-aac3-400a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '80caab696b69df9b76ed44440e6d9a0ad360ba521f0229014986abb923f6019c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-87a4-42e8-9761-4f52950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '817daa9d76d0dc834cd63c905703412f3c749c91f4e79945427bc713a18cc5cb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-3998-46cc-8648-4d2c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '8205524c6b5b6a395c44585fb04e835fbcdff2b0a135b210dbb281a33feb39dd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-2818-4606-a33e-4c4e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '82b4da37d492b024b190fbbe30dc08b1d9b877f20fbce057ad1b1c0566421994']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-f9b0-4687-9d6f-476e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '836f470f458f72ffe7d9cb3de221ca9cacd2fccb1d209a3d11f30cf6304556ce']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-b1e4-4516-b653-41f2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '86b826543a4e343cf2ecc8f8279b859aadf5034a25613d30eb13d8f4f1d8cd57']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-7da0-496f-8ace-4652950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '87fbf04b07fcbdd2f97f1f51d99abd19f1572f33f8253be8d79152c9b6d00aa7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-4254-4b6b-8e2a-453c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '88969b47fe1ad89b50f5bafa46ec769622e079ebf7a498a78f7077a87b2b90a7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-0960-4762-b74a-420f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '88ad17307f86b59c35f1c424cf785343ae93a58979ecbb063e6f44603675b918']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-3d68-44bf-9060-4bf1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '8935407185ddc8197b8cd84239faa2ab31e87178ec0c7ad0205a4bb6a8bca6f6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-69e0-40a4-8ad2-47c0950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '897b2f0c72cc89596f02d1d496578791677f61c4f1ef71aa2e784746479095bd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-8eec-40f9-af5e-4943950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '8af4c02a21385918fbab32079e38bd955dbfd9a3b5cd409668830053a14b07dc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-abc4-47f7-b16f-4e5a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '8f29b3bc0ee8bdb00971576403db7854b3a59a8997fd7ccced8d23e834455d36']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-0c54-4075-9825-42ef950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '924b32b407b44c7ff6788004120cd85d410648a04cd6f5360db3e199e6c82a04']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-d234-44ab-992e-41d6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '92bf654e3cc50af479468180a3ee520bc13f979c9e50b18886cabcea09b1220e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-84f0-40db-a0ae-459b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '93107f3a350dc955a632a5011f7cb274b0ca9288c2106bf6c971bbb09c0ececc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-4bfc-4666-97b4-4712950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '932be9385b60b1b2f7d2e2861a9b568a291846ecf0227413417c99d2d16785c0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-1ec0-4f6b-94a5-4176950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '949e42af2d12099f743d9c83dccaa01885ecf9f3bc40a99a9a868a7dc3e7f367']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-d884-4d4f-9af0-407e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '9833daa8499feb9c7fb1c6422e64904712711eb579d5196e55296cbc5a7bbbe4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-51d4-4c45-a4fa-4371950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '9884d3287d3be69a0d06c6fd414d828b0036106580f212e39b6adbbddace2010']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-d998-468d-b58c-4691950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '9ad3cbe820b31d27dca4c28d56ba3654735e7d1d00b091167fb1a8d9ac0dd31c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-5a54-4415-b5bf-481d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '9b636ae57cc03448c09ba6501fd71a2885a947db2295365cfe1fb3df3900f72b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-eca4-4f85-a3e5-4858950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = '9cdd5a451b12b913bc48ae99877f3f3ae830e94fdc7a93bc919c8b31eb2dd8de']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-86c4-46bd-b10c-404f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'a130cd38f7de1d801a78f2c06a596a578ae3d75bf1b17d5d45fc1733c69f4268']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-1c34-43b6-aba1-4775950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'a3e2b07d7094473e7bcfedaf4e1df411f8c4e5113658332dfe1ca32f621ab33d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-a650-4f75-b83d-427d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'a4335d27b9ca8ab14154aff918034194a98a12eb25607e00613965bf053bcba6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-5e20-4ffc-97fd-42dc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'a6a8204b0fe9a34ec7c41a60a54a0d4af1d34d0bbda89c0828092a7a11226f0a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-1b68-4c3d-ae45-416e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'a78cde697ef1aa54eb3ad74dcc0f1a40b5aec3ef936e213e7fd38480e07e919c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-f4d0-4667-a502-4784950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'a95b7e80425bee413ac5a022bca996ad0cd2bd18ed5db7fbe6c0769c5399a163']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-b27c-4d7d-a2b5-4e19950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'aa96c4de7bc4edeb68bd03a6a5455139e389e4e40e154732ddce3255e2f7efe6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-4e90-49be-8189-49c7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'ab0ca8231c11d7f0aa9ac32e270b86eece17946a8fc12220788f9bec35b9f584']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-0e94-4c99-bbc1-49bb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'abacd28fa6ac67ecb85aa15ac26d48fc60c5d0f8a0301f0d1ea4421c69685c3b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-b980-4c71-b90d-455e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'abf127380298bbfa143f58fe58b862808d7ca5f52e1c5daf67f917efd3372639']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-759c-4e38-9275-4754950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'acab9cc10a836c7b94613902e585867973984c10284a7cbabf046de205b4903e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-4284-4bdb-8a6e-46c1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'ad0f1d6393747a394353e830b3d0c89dd3cd8c4a8c1bab1064451cae5a4a1b36']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-06d4-45b0-a1a9-444f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'ae0014aa96e81d431c4c12e052b9dbb18c065eecef79f40d0f808c403e7399bc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-ec58-45dc-b7b5-4a96950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'ae9457c1f954f6c53914a46c15c906e542a01b830bbddd61fc64ca76e13e4d09']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-bfe4-42ff-a1e3-4104950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'af392fe93ca1e02fa5c12284dab4a3c3f8eda251c86be8b1c54b8d6486c91242']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-8560-498d-9a1f-4ebd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'b06eb80d956774cb2ef9a38ee6c2a5af34729f575c80ba6af4bf6e501497fc0c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-3b3c-4b36-897a-4bfc950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'b34964eff2f2c8f85c4ed710d0eab0e40c0268447a703bc277ee016e804c79b4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-f17c-4809-99d7-4377950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'b6b715982d7674f28e697ab896840d8dc596324351ab5aa21336c597d72d7500']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-2ff4-4df6-aa5e-4a3c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'b7475b1e27ee13d5ca7a59186fd6621bda2632910a2c4bf3117acf4e441b9b94']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-78f8-4581-a89e-49d1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'b8b7b45988030666a9f63e7cfaba1a6d7dc5daff3e788a0afe5e375b55f982eb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-9aec-4349-8674-4bcd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'b9c1901743e8ca362a8efb77f1fb895e924c3e8abc5161f2bb44182a0c12523c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-d068-4eaa-83eb-4eea950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'bda7983c416f16c74a954c37fd71af2b95f2c3e7cf9f4746d16cbe206974dba9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-2bc8-4071-bdf1-4ddf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'c26dbbb1c5ee2c35561eebdd89f03be9e200da66ba31f63c1c074300c9277764']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-c1c0-40ed-b42e-46b3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'cdcd65ada6539ae4311ac2a7edb2db6b0235edaba56266033e0690a7280504f4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-ef6c-4d59-98ba-4383950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'ce316a440ed198eb286f01f6c18297f8207d7ee56c5fe0f415a2bb43558e4117']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-ca88-4b78-a814-43b5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'cece67cd2b40b314c9ae10efa5468cc8c734a9d609f2b6df159fc87d56a55926']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-4b04-49c7-a187-4c81950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'cefb8008b9d77d635842c5cc141fb47243ab1c2ce42145e2c2cf27ff341ae3fc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-8210-4397-98d3-422c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'cf35ce413d812c79d61fb6e30aacb203ab23c253d7cbef28941f92923aaf6aea']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-eb1c-4100-8ff9-485b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'd13459e6a495ecac9e21b95354ad12c22203c9f7cf87390388ad15a9cd21b5f4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-4b90-4f1d-8cdb-46b4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'd2a74a18a10e03fa27fbd7f954befa11ae39688e9380cfa6ea5edc7c5f2fe02a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-5934-4478-8ea3-4092950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'd70c43fde7ab1dc8428a794e860c7aaa14c5a5c70747489bd3f2f16bcc8ea6d0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-bb9c-4b4e-9eb6-4078950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'dd58286c5ce17c1c18cd7c13aa61cdc97bd483a98e79c9ab474d6ff6f1ba1269']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-70d4-440a-af73-42fb950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'ddd0869bbe3586a18e728396fa3e77bdd794f4cf86584d92e0d6796d02672f68']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-9458-406f-bcfa-4ff6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'de1499522ca82e52c9b05fc00254634191de681a19b80be5823bbf38df0f569f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-4c4c-4c59-9909-48ef950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'de56fa75b0a7774bdba6e58dd1a1cc06b6b2b40d96189716612a07f4817a8d28']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-26a0-484b-b5a5-43d7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'de9b33b92113cbd0ec51b9e13596f5320d45bbb7b0222a6a17ed2867a2ff68bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-76ec-4a28-ad8b-4831950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'de9bfa660708b04c9519c9ca7d36cd5c6b9dd5b448cc0ee01b0ca846ee381965']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e038-472d-86b5-461d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'e00b0692087d2739aea7a8b42b92fd6a09fdee29744a760d7553b002ff530550']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-a18c-4b84-be31-4648950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'e37bbf95ce83592f7c72d548842cb33be5d473bf1cb18dd9910edb9692fcf1b5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-fbe4-4b1a-a7cd-4637950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'e58a63d24e82bf00fc092c56e6ee75f0e3f0318dc0dbc6093897645795e3fa9b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-5da8-4911-b74f-42dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'e685b870f436c8bf4eda02666b99c02631ca165e90a122347929f3e1fff6dbe0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-33f0-4f56-93cd-4d96950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'e854dbc8dfe31447083411d4f597de00e4addfe265a3c3103d8d3a5961ec82f0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-e580-4990-b1f7-48a3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'e89d9478aa4451584a1e6263dafaa39059e0aac3b1c02f00c64705bbb5449a43']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-f060-4e3a-a928-4bb4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'e8dcdb7f6d3108ba1ad0800ba6167f7456e4a1b2c95038ecd7960989402f54ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-5194-4f43-b9bf-44cf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'e97db554bb5fe030afb67f0a683857d124e7e05942f6d77b637056758ac0a4c1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-650c-4a8a-9304-4490950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'eeca7f0a6bcb9132e9ada7c8913aa39eb87aed9955dcc7f870f7c85a3f415362']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-5d90-4c2f-8124-4f37950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'f144d58388ad6137c62581987da8dbb558e347670d79521898fb2b3084372963']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-74f0-4cce-9fa0-4710950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'f1b2aad1a13527a4a420bf395f9aef9be0e024867ec07e7bb4ef142a5adaf1c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-97a4-4bad-b3ad-4c60950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'f2ef77cc908de0654bfcc4144cac05d56b6f7ba2643b3ba186dbdcaaf4832e32']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-84d4-4b97-822d-4d0b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'f4f6391577fae61e6aca3040ca8fad69ea545cfc9cfeaf876f92be42e1ce8f5f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-a6c0-4bbd-a5cf-4c97950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'f8002689fec2703e5560634aeaa89fabd96fba28316d31a41bf975f14ad1dfa6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-9f44-43a6-a0dc-494c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'f851b6fceaaa704f2efc94db26599c64f0b9c99dbb130ee2ad14c598c245ec11']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-969c-4842-bc10-4e5f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'f8bdb65d54ccab04a506e84f14bdbeef15f6266a7bd6e4e7dfde69de424dd10a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-981c-4cd2-ad6b-4270950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'f987fa5e278b9998b9c44c723a1892f92868da0b0c856777147fe1b10c7a45ed']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-d96c-41eb-8915-456d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'f9c8bdf92cbd751f35f902fc48760de7d75248742708c9ce95f748273c8f2a4f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-6ce8-454b-b54f-4e36950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'f9ca935d9f3a6aac48de55486eb8ca62f003baf50ced255305048464d9fd0016']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-f704-406f-84d8-4fa4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'fa019bb31fd99bfbb36bca3bf9b16c589cacd2f9cee2ba061dbb73479d4c389c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aa7b8c0-950c-4f35-ad48-4943950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T11:40:48.000Z",
"modified": "2018-03-13T11:40:48.000Z",
"description": "Executable File",
"pattern": "[file:hashes.SHA256 = 'fe206a8849d7f95e4233effa97883a03e2d8d3672c0b9af18dcf9d5d59b9f22b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T11:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3ebecaa7-b9a3-48a4-becf-194625b24f9d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:53.000Z",
"modified": "2018-03-13T13:37:53.000Z",
"pattern": "[file:hashes.MD5 = '12d070eb94b43e5ea279f913b1b88888' AND file:hashes.SHA1 = '8e8ee386d56f308511f69045b9b06160f3cc40f9' AND file:hashes.SHA256 = 'f7854d717ea3449b6cf2ed56b8fc1e790dff23df19c62e554f233300faac8750']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--be09f3b1-9fcf-4d5b-848e-41fecd41123d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:52.000Z",
"modified": "2018-03-13T13:37:52.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f7854d717ea3449b6cf2ed56b8fc1e790dff23df19c62e554f233300faac8750/analysis/1520467062/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d430-80b4-44a0-83a6-480f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d430-bf34-4151-9467-483d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 23:57:42",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d430-edf4-4b8c-8d3b-46af02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b5694caa-9b22-415f-8272-9c57b3eb08c3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:55.000Z",
"modified": "2018-03-13T13:37:55.000Z",
"pattern": "[file:hashes.MD5 = 'd19dbd2b682562a9e9f0358e1e213290' AND file:hashes.SHA1 = 'a7d3eca0ca37cfdf4c52b8d1c5dfe66c2c1f0044' AND file:hashes.SHA256 = '2dc8a22cdf1b5f9eedfd45cc7c1e224714fb9ceb7e06dc25b69efb9f45413b0a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2b4622e3-ecfd-4e33-88d1-4be6fee2d27e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:54.000Z",
"modified": "2018-03-13T13:37:54.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/2dc8a22cdf1b5f9eedfd45cc7c1e224714fb9ceb7e06dc25b69efb9f45413b0a/analysis/1512481722/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d432-45cc-4353-9e9e-4e5202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d432-7984-452c-8b8e-473102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-05 13:48:42",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d432-07b8-4fd2-b755-424c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--04a11bb7-a841-49e4-b957-a50ff66a07ef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:58.000Z",
"modified": "2018-03-13T13:37:58.000Z",
"pattern": "[file:hashes.MD5 = '7d2010d01fc2b0bb71e24e6546c410ce' AND file:hashes.SHA1 = '9bda9db18fd4838cb98da4276b2baa09eb662426' AND file:hashes.SHA256 = '5112d0c215a4ab21157be3752b12c4a5dd663b20a0373f686e8a091341d3ac52']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:37:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--da8cc514-e9c2-43ba-8713-65bd1ee4cc93",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:56.000Z",
"modified": "2018-03-13T13:37:56.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5112d0c215a4ab21157be3752b12c4a5dd663b20a0373f686e8a091341d3ac52/analysis/1520438567/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d434-9764-4ebd-8a19-44de02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d434-1094-4f99-904a-46a202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:02:47",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d434-aad4-4885-8226-4bd702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--010c6b65-7d24-4eb1-b9f3-161e4bf63908",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:00.000Z",
"modified": "2018-03-13T13:38:00.000Z",
"pattern": "[file:hashes.MD5 = '5df549a1a1e3e70a417763230171d0f6' AND file:hashes.SHA1 = '5da098f6c1c09d9f32bbe6b4cc65c98bcb66a19b' AND file:hashes.SHA256 = '7dc0eb78c2d5c8d7a07df541df4766620f68e28e06778c5a6ed70438c9f24499']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3027a1fa-cc56-4b97-9c23-f87a15628a5c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:37:58.000Z",
"modified": "2018-03-13T13:37:58.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7dc0eb78c2d5c8d7a07df541df4766620f68e28e06778c5a6ed70438c9f24499/analysis/1518347316/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d436-8620-4a30-b39e-449a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "22/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d437-3720-4d87-a08f-41ef02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-11 11:08:36",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d437-981c-43cc-9653-4bdd02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2ea254d8-6356-40c2-962f-e9a22e94b9a2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:02.000Z",
"modified": "2018-03-13T13:38:02.000Z",
"pattern": "[file:hashes.MD5 = '38b41c40fc0994c69344e6efe6caf786' AND file:hashes.SHA1 = '3fa4f1979a18f2f6abc415fc68da0b74b1acc82f' AND file:hashes.SHA256 = '286011ba8c7e9f16b219d3919eeaa625391446525fab30d7adb532957003304a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a0e300ab-5db9-439a-a31d-078a28483155",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:00.000Z",
"modified": "2018-03-13T13:38:00.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/286011ba8c7e9f16b219d3919eeaa625391446525fab30d7adb532957003304a/analysis/1520409829/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d438-48f0-4a4d-9e31-4b0402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d439-78a8-4f6a-9842-4c0f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 08:03:49",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d439-ef28-4014-ad4d-486002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7aa4af10-cefa-4496-aa7c-aecaa6ba6915",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:04.000Z",
"modified": "2018-03-13T13:38:04.000Z",
"pattern": "[file:hashes.MD5 = 'c7ff6ce2b338811932fe36fa6430c1f0' AND file:hashes.SHA1 = '2d37496c54ab77250a112dab7511bb6f6e4e05f0' AND file:hashes.SHA256 = 'a130cd38f7de1d801a78f2c06a596a578ae3d75bf1b17d5d45fc1733c69f4268']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--168731b1-b9f6-49e3-8396-e43356f48865",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:03.000Z",
"modified": "2018-03-13T13:38:03.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a130cd38f7de1d801a78f2c06a596a578ae3d75bf1b17d5d45fc1733c69f4268/analysis/1513615961/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d43b-b548-4295-889b-48f502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d43b-c0d8-4831-9e5c-4e2302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-18 16:52:41",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d43b-7fac-428f-b3de-4ea202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c3854528-0d86-43d7-9af1-c892adaa2014",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:07.000Z",
"modified": "2018-03-13T13:38:07.000Z",
"pattern": "[file:hashes.MD5 = '95895033c692be575587b4865bc278c3' AND file:hashes.SHA1 = '611c30a5ff3486fd3b4afb1f8b4a09b4ac8a68cb' AND file:hashes.SHA256 = '15cc66021a04a4667e58ca9a7c8b9382dac1dd5869c788ceae47642454472b3f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e3120171-4e17-469d-87cd-1c3b2214b193",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:05.000Z",
"modified": "2018-03-13T13:38:05.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/15cc66021a04a4667e58ca9a7c8b9382dac1dd5869c788ceae47642454472b3f/analysis/1520869141/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d43d-4a68-4633-9904-4c0c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d43e-0f18-4439-8dd1-477b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 15:39:01",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d43e-a554-46ed-9c17-47d702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--32755cdb-a46a-4796-a3dc-8cdac5895b13",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:09.000Z",
"modified": "2018-03-13T13:38:09.000Z",
"pattern": "[file:hashes.MD5 = 'd41325b887cbcb955ce9325045fc8576' AND file:hashes.SHA1 = '1794c15e399551b14e41189347cda5ff06ab651c' AND file:hashes.SHA256 = '241658e90abf3416d97bfeff1e194d03d3103a7b07670b56420b4b4b61308b84']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c8f2386e-a26d-4911-8a45-e5f037add7f3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:08.000Z",
"modified": "2018-03-13T13:38:08.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/241658e90abf3416d97bfeff1e194d03d3103a7b07670b56420b4b4b61308b84/analysis/1520871660/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d440-cca8-4bb9-9172-4ac302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d440-c560-4dad-8bc9-4a7002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 16:21:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d440-6374-4024-ac0c-485002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83b23c1f-380c-4c9b-8ff1-d88a0d77e200",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:12.000Z",
"modified": "2018-03-13T13:38:12.000Z",
"pattern": "[file:hashes.MD5 = '17bfd2e6a363c52192da32afe98786e9' AND file:hashes.SHA1 = '9d91e7a1b12ddbcef885c025c2309fffb48a65c7' AND file:hashes.SHA256 = 'd3f79eb90bfeccb507f69989ed38e32fddd7108660c92313260a64c798fe0167']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--38764b5c-c154-4392-a0c3-7574c19b999c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:10.000Z",
"modified": "2018-03-13T13:38:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d3f79eb90bfeccb507f69989ed38e32fddd7108660c92313260a64c798fe0167/analysis/1517544512/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d443-2fac-4cb1-b781-49c202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d443-b8f4-4703-8b55-4d9002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-02 04:08:32",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d443-ad10-4834-b193-45c602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--91f03806-38a6-41c7-bf7b-59cde7114d4c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:15.000Z",
"modified": "2018-03-13T13:38:15.000Z",
"pattern": "[file:hashes.MD5 = '15b184dc5f5e2c6cafdf3edce8334a83' AND file:hashes.SHA1 = '7ac5151f5704d285f8b08339cb63cd44d0e96e86' AND file:hashes.SHA256 = 'ed99eea02491a4c659a54cb39f368b7c4713cbc6ef9677f169c1cb09f533bd6d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--06833811-1d61-4866-b351-c35e84d53f29",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:13.000Z",
"modified": "2018-03-13T13:38:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ed99eea02491a4c659a54cb39f368b7c4713cbc6ef9677f169c1cb09f533bd6d/analysis/1520441156/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d445-c440-4c2f-bab8-47d102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d445-3758-4fdd-b823-43fa02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:45:56",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d445-8068-4312-b40c-4f4202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1862b97f-3ec9-4764-af14-cb1a39e2e1e2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:17.000Z",
"modified": "2018-03-13T13:38:17.000Z",
"pattern": "[file:hashes.MD5 = '600a117120bece227b6c0bcda0ccd974' AND file:hashes.SHA1 = '3b86c3eb55a99e65fd531230a45483c5ecf9fa1d' AND file:hashes.SHA256 = '34f08e0d3d5f430e1a3b3604a9c5cb26850967b6f4468a5d1146f1681ef99dad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0e9a8a1d-4d35-4624-8a79-456fb80187e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:15.000Z",
"modified": "2018-03-13T13:38:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/34f08e0d3d5f430e1a3b3604a9c5cb26850967b6f4468a5d1146f1681ef99dad/analysis/1520906160/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d447-44a4-4456-b0b8-410e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d448-de84-4ba7-bf2d-4db502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 01:56:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d448-d3d4-484b-b17d-4d7102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--333502f7-2faf-4732-9cf8-0b57085db280",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:19.000Z",
"modified": "2018-03-13T13:38:19.000Z",
"pattern": "[file:hashes.MD5 = '496464ba835cd0b5dd8c85a0d0becd9d' AND file:hashes.SHA1 = '0019019258d008f059a4926d795e9d1e70b2c878' AND file:hashes.SHA256 = '64a7fb913f2507a283917dbd3d22ec8335d0cb462e3d92711cd8396b3cf09edb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a0cd4885-4c2a-4471-a8a5-03700ab2cf77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:17.000Z",
"modified": "2018-03-13T13:38:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/64a7fb913f2507a283917dbd3d22ec8335d0cb462e3d92711cd8396b3cf09edb/analysis/1520438973/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d449-1f6c-4691-88e7-41ed02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d44a-d350-4589-b12a-4bc002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:09:33",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d44a-9efc-49ab-a4de-4c2402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3df64f90-91fe-4af4-b4fe-8fd371df1e2b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:21.000Z",
"modified": "2018-03-13T13:38:21.000Z",
"pattern": "[file:hashes.MD5 = '796b9875421e469913d322cdcefbd394' AND file:hashes.SHA1 = '87caf45c0ebe5fbb4586424343c0130bcbf09f8f' AND file:hashes.SHA256 = 'f2ef77cc908de0654bfcc4144cac05d56b6f7ba2643b3ba186dbdcaaf4832e32']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--05943cc4-e0ee-4d46-b752-673fd1f9347d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:19.000Z",
"modified": "2018-03-13T13:38:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f2ef77cc908de0654bfcc4144cac05d56b6f7ba2643b3ba186dbdcaaf4832e32/analysis/1520634831/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d44c-1478-487e-84a2-447102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d44c-37c8-4eeb-9c7c-413802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-09 22:33:51",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d44c-a3dc-4b46-95ec-48c002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--73813f31-8277-4a96-abec-99d11d5855d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:23.000Z",
"modified": "2018-03-13T13:38:23.000Z",
"pattern": "[file:hashes.MD5 = 'd16db9fc78598014d0dda258c84377e4' AND file:hashes.SHA1 = '38149c57f239b678c4a1ab44cda8639db576c7dc' AND file:hashes.SHA256 = 'ca9d11fb8b3919443e066d8e91587c34191c3b273a0f884c48084df77263de55']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a9d050ef-1ff4-4906-a484-cf8f3f7cad84",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:22.000Z",
"modified": "2018-03-13T13:38:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ca9d11fb8b3919443e066d8e91587c34191c3b273a0f884c48084df77263de55/analysis/1520909341/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d44e-faf8-43fc-b619-4d6902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d44e-ed30-4d78-8d87-46f302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 02:49:01",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d44e-42e8-4876-86a7-4a3f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a9ebf88-5d69-41e7-a572-971cb751e615",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:26.000Z",
"modified": "2018-03-13T13:38:26.000Z",
"pattern": "[file:hashes.MD5 = 'fae90d5b6a627cbaee52f0b6a8c2c0d6' AND file:hashes.SHA1 = '6f107ea761e5f482fbf544ca1c7edb2a810af8b8' AND file:hashes.SHA256 = '14284152d53c119ad04c986a2a115485ae480d8012603679bf28ec27e3869929']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--98f9a90f-6b1c-45b3-a027-9837ecbb6875",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:24.000Z",
"modified": "2018-03-13T13:38:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/14284152d53c119ad04c986a2a115485ae480d8012603679bf28ec27e3869929/analysis/1517308985/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d450-a7e0-4ffc-b70d-439d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/65",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d450-5638-4782-949a-47c602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-30 10:43:05",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d450-8258-4230-b6f8-4ca502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--694ccc7c-c1e3-459c-be5e-8bbb60cf776d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:28.000Z",
"modified": "2018-03-13T13:38:28.000Z",
"pattern": "[file:hashes.MD5 = 'adc3f050e41ce0dcdfae7070838b5350' AND file:hashes.SHA1 = 'a227fca87c1bb0ac4e0094101ce96c5d7987a417' AND file:hashes.SHA256 = 'b7fe03048f861222f9a161369e5eb38f67b13eb0de4050be089b394c7f30c593']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--16b262fe-fc38-4a41-aae1-f7c79a3f2b27",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:26.000Z",
"modified": "2018-03-13T13:38:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b7fe03048f861222f9a161369e5eb38f67b13eb0de4050be089b394c7f30c593/analysis/1520440682/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d452-2590-408a-ae17-4d7b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "27/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d453-ed58-4039-9783-4d5402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:38:02",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d453-a004-4abc-85b1-481b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7fbaea4b-0ef0-409d-80eb-82e5dfba5994",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:30.000Z",
"modified": "2018-03-13T13:38:30.000Z",
"pattern": "[file:hashes.MD5 = '7e4026976a304ad0530aac84e5393dc1' AND file:hashes.SHA1 = 'b2d4507bcab81d3038726eff176ca4fef28bd6d6' AND file:hashes.SHA256 = 'a9992d6d8a97f54e2b08ac58e0a50bacc6307033a91315e3ff1bc0a531b3876d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--eb32ed3c-79fb-4635-9706-c65725f4925c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:28.000Z",
"modified": "2018-03-13T13:38:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a9992d6d8a97f54e2b08ac58e0a50bacc6307033a91315e3ff1bc0a531b3876d/analysis/1520440334/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d455-83c0-4815-98ed-4bb802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d455-5a18-4dc0-9e7d-410602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:32:14",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d455-caec-45a5-869d-4bd302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2bf82666-d839-4cb4-9d62-47afcbabb8d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:32.000Z",
"modified": "2018-03-13T13:38:32.000Z",
"pattern": "[file:hashes.MD5 = 'f97f0c45de189d14bed8dc6584ad2811' AND file:hashes.SHA1 = '477a25663016d6c04221adac86cef0f60fe09aa1' AND file:hashes.SHA256 = 'ae0014aa96e81d431c4c12e052b9dbb18c065eecef79f40d0f808c403e7399bc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--72530e57-9793-49b0-a161-0078753a7e2a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:31.000Z",
"modified": "2018-03-13T13:38:31.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ae0014aa96e81d431c4c12e052b9dbb18c065eecef79f40d0f808c403e7399bc/analysis/1520376538/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d457-1148-48a6-9927-456802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d457-0984-49c8-bb9a-41bf02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:58",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d457-59cc-4cad-8d8a-467d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5061f21a-a424-479d-b119-eb03ca72474a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:35.000Z",
"modified": "2018-03-13T13:38:35.000Z",
"pattern": "[file:hashes.MD5 = '8675c7bb67c60346b3d46d48eaa9d004' AND file:hashes.SHA1 = 'ac8183d7692c698b880a016c51f870edd30a25d7' AND file:hashes.SHA256 = '7d1c32f8f47355218320a793c3f0f74c6fa7a19c22f7d01eee947f6960dfa466']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9bf45a52-e2d6-4363-85cd-9f1762674618",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:33.000Z",
"modified": "2018-03-13T13:38:33.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7d1c32f8f47355218320a793c3f0f74c6fa7a19c22f7d01eee947f6960dfa466/analysis/1519923960/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d459-7eb8-4559-8173-495e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d45a-cc7c-4649-ad3b-4b3602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-01 17:06:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d45a-986c-4663-a347-46ec02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d3f36e32-07db-4834-8c85-432352352e55",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:37.000Z",
"modified": "2018-03-13T13:38:37.000Z",
"pattern": "[file:hashes.MD5 = '33161cc105dfaa7ad511efc5648e7dad' AND file:hashes.SHA1 = '6347ee6ae62b1f94c03aed4a8be54c68408b8913' AND file:hashes.SHA256 = '34a7e963ff82d073b6c2b2fda7bfbb9ecce9bb4e437be856252f14de6040b8ad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e89df188-9ef2-4fb1-af1e-7d8990320d01",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:36.000Z",
"modified": "2018-03-13T13:38:36.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/34a7e963ff82d073b6c2b2fda7bfbb9ecce9bb4e437be856252f14de6040b8ad/analysis/1520376429/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d45c-96b0-4947-8e07-415b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d45c-1fe0-4055-8088-419d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:09",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d45c-f884-40e4-900c-486702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b6089b1d-ce2c-482b-acbd-4940ddf9b43d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:39.000Z",
"modified": "2018-03-13T13:38:39.000Z",
"pattern": "[file:hashes.MD5 = '0afeecbcc47c0cf76c36e5b4c6412122' AND file:hashes.SHA1 = 'a6a231c081b7bf58316b24aa9a43bb982962958d' AND file:hashes.SHA256 = 'caec6bb70c5c1ba33b2c0981e39b335177b3a31d9fedfd23e4c8194abdb3d6f1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--776e3fae-22a7-473d-8c9e-448f7cebe70c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:38.000Z",
"modified": "2018-03-13T13:38:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/caec6bb70c5c1ba33b2c0981e39b335177b3a31d9fedfd23e4c8194abdb3d6f1/analysis/1520376476/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d45e-bc84-4806-9b2f-443a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d45e-fdac-438d-9b71-4ae202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:56",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d45e-7534-4706-9853-4f4e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--943bbe65-be8f-4fcd-a963-8f40bee18ea7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:41.000Z",
"modified": "2018-03-13T13:38:41.000Z",
"pattern": "[file:hashes.MD5 = '01ed114fde71c5f9e77dfdcec884767a' AND file:hashes.SHA1 = '1ef6aed3d369cf10977426fab35e78886469ada3' AND file:hashes.SHA256 = 'fb74870bd4441e5933712c79804c3d9aeb0ba86162295990183abe8daa235c3d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--327db92f-c41f-47c6-9791-7cde1d9ce511",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:40.000Z",
"modified": "2018-03-13T13:38:40.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/fb74870bd4441e5933712c79804c3d9aeb0ba86162295990183abe8daa235c3d/analysis/1520441529/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d460-b400-45e5-ac7b-4ca302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d460-0188-48d5-b969-4b2902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:52:09",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d460-4500-47c2-be1c-4fe902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a6de377-1b81-4988-9132-ed8d9ecf36ff",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:45.000Z",
"modified": "2018-03-13T13:38:45.000Z",
"pattern": "[file:hashes.MD5 = '2d1aa2d568bfa93cbeb9ec35e53163b0' AND file:hashes.SHA1 = '5b9413061ef40b8a946c2ecd6bd2640a923ecb93' AND file:hashes.SHA256 = '8a02499298a1d12223a751a288092e6f196957e84179b91cfebb6093ac15fd54']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3ea6b034-235f-44ae-984c-8e5d8e2b3499",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:43.000Z",
"modified": "2018-03-13T13:38:43.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8a02499298a1d12223a751a288092e6f196957e84179b91cfebb6093ac15fd54/analysis/1520439745/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d463-5d2c-42fb-a570-45c702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d463-6cb8-438f-a3b8-4ff802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:22:25",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d463-782c-40e6-bacb-45a702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--39755ccf-9fff-4b16-b894-a4742fe0b548",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:47.000Z",
"modified": "2018-03-13T13:38:47.000Z",
"pattern": "[file:hashes.MD5 = '1b3ecd957973c315fbab3aa1bccd3ace' AND file:hashes.SHA1 = '6cdc4027a5dc1219e26a2a0acbc2fcb7d4c5eddd' AND file:hashes.SHA256 = 'e43c2070435f9aa704408a6e4f9112b2e83288039bf8382023c3973956c670ac']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--84cb6f05-0dd6-4fd0-869b-5051282359e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:45.000Z",
"modified": "2018-03-13T13:38:45.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e43c2070435f9aa704408a6e4f9112b2e83288039bf8382023c3973956c670ac/analysis/1517469316/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d465-ca10-43d4-9874-417002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "26/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d466-c124-416f-828e-412202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-01 07:15:16",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d466-d7f0-42ac-a1b9-4eaa02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f2989d98-57c2-4e75-b139-d98f1debcd6e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:49.000Z",
"modified": "2018-03-13T13:38:49.000Z",
"pattern": "[file:hashes.MD5 = 'f9d75d3dbab78e66097423fb272ad696' AND file:hashes.SHA1 = 'e21037f9b69f056a730318b9d924b102d3ce6beb' AND file:hashes.SHA256 = 'e00b0692087d2739aea7a8b42b92fd6a09fdee29744a760d7553b002ff530550']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--91ba1536-8bd4-4a09-a11f-590dd2f76adb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:47.000Z",
"modified": "2018-03-13T13:38:47.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e00b0692087d2739aea7a8b42b92fd6a09fdee29744a760d7553b002ff530550/analysis/1520488603/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d467-2038-40d1-b643-475302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d468-55cc-4efc-bb93-4d6402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:56:43",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d468-a094-4196-ada1-420302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4846a202-a825-4439-a27b-2e9855f3e75b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:51.000Z",
"modified": "2018-03-13T13:38:51.000Z",
"pattern": "[file:hashes.MD5 = '1e0220c4b3b7df9f64f35de39aa9886c' AND file:hashes.SHA1 = '25b03486e53fd57f21be2b2dad2ff6375b60d9b6' AND file:hashes.SHA256 = 'a3d86b86f08def93a12afbbcb1748d60859277c3515c2fbf211a1e0d9cf0998d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fac91df2-91df-4947-8855-c63df8ea4719",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:49.000Z",
"modified": "2018-03-13T13:38:49.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a3d86b86f08def93a12afbbcb1748d60859277c3515c2fbf211a1e0d9cf0998d/analysis/1520904540/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d46a-2044-4b48-8c3f-42b302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d46a-fe20-471b-8695-4cc202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 01:29:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d46a-9f24-4d01-9bd0-42af02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e01012ad-efbd-43a2-ae1e-925c8c88bdfb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:53.000Z",
"modified": "2018-03-13T13:38:53.000Z",
"pattern": "[file:hashes.MD5 = 'a74246c45d5b96a8d1e1a2471b8d363e' AND file:hashes.SHA1 = 'fbc538bd30a4af995606b04576071012568749b7' AND file:hashes.SHA256 = '35ef838fa56f2c30dd62cf97421e8d4c322d593992560f1631c68492a0d39150']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--875c39a6-aefb-4cab-8dd1-76de2098bc65",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:52.000Z",
"modified": "2018-03-13T13:38:52.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/35ef838fa56f2c30dd62cf97421e8d4c322d593992560f1631c68492a0d39150/analysis/1520438110/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d46c-d190-46bf-9ee4-4ebe02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d46c-868c-490b-b48f-49b002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:55:10",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d46c-a954-4ae1-b55e-465f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--170a0ade-9dbd-46a0-88c8-9b9c31f603df",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:56.000Z",
"modified": "2018-03-13T13:38:56.000Z",
"pattern": "[file:hashes.MD5 = '0b08cf45db88cdaf34b088daff9ad54d' AND file:hashes.SHA1 = 'b37f6583310053975dead7cd6d69044799d891af' AND file:hashes.SHA256 = 'b4e43c40405579f7e508e5d546975b4b2bff83a70d7dfe98fa64dc407894d103']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ee355cf8-ecb9-43f6-8af7-149019418b7d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:54.000Z",
"modified": "2018-03-13T13:38:54.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b4e43c40405579f7e508e5d546975b4b2bff83a70d7dfe98fa64dc407894d103/analysis/1516822257/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d46e-7280-46f6-b4e0-48c402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d46f-e5c0-4ef2-80dc-47d402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-24 19:30:57",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d46f-6ff8-4c61-a5eb-4cbe02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--acaf2fa6-6f3c-4b06-a5f9-3bb31b191409",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:58.000Z",
"modified": "2018-03-13T13:38:58.000Z",
"pattern": "[file:hashes.MD5 = '67711e0c8d11d64091a3b694c340d087' AND file:hashes.SHA1 = '672b50a2881cc8f90c34f742f9972a978ca0615a' AND file:hashes.SHA256 = '80caab696b69df9b76ed44440e6d9a0ad360ba521f0229014986abb923f6019c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:38:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1eb655cb-6991-4136-9a71-5d07c824734e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:56.000Z",
"modified": "2018-03-13T13:38:56.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/80caab696b69df9b76ed44440e6d9a0ad360ba521f0229014986abb923f6019c/analysis/1520439559/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d470-03e0-409e-a0ae-4bd402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d471-dd28-4342-a208-41c402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:19:19",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d471-703c-46e6-9528-459602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57b549c9-a6f5-4fbe-93de-835d64e5d801",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:00.000Z",
"modified": "2018-03-13T13:39:00.000Z",
"pattern": "[file:hashes.MD5 = '9af8749f111df6d6439b7e78485c8643' AND file:hashes.SHA1 = '74bedd4b79c0211fd82b8f97769823d427118306' AND file:hashes.SHA256 = '272c9c24b43e879d75da6c9b308510c80ce989101e5fd221843d6e35ce442191']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1c17f990-5b27-40d9-a80b-e2ff9a10c38f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:38:59.000Z",
"modified": "2018-03-13T13:38:59.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/272c9c24b43e879d75da6c9b308510c80ce989101e5fd221843d6e35ce442191/analysis/1513253566/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d473-b2a4-482a-9ee4-49cf02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "53/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d473-37d4-4ee9-87ee-4a7c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-14 12:12:46",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d473-e524-4236-9c31-411902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83846430-c5cf-403f-821c-665b6d7d24ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:03.000Z",
"modified": "2018-03-13T13:39:03.000Z",
"pattern": "[file:hashes.MD5 = '220733f225c7dd33665951ad311f9d8f' AND file:hashes.SHA1 = '6fc79bbca8a6a182423379718e8dec62b59c5435' AND file:hashes.SHA256 = '30f185c47f29987917fda34fa979573f19269c70bfcb9457c6a1991a04953a40']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bac69422-8149-4b9b-b191-268f042035aa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:01.000Z",
"modified": "2018-03-13T13:39:01.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/30f185c47f29987917fda34fa979573f19269c70bfcb9457c6a1991a04953a40/analysis/1520869021/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d475-24e8-4dd4-bb87-499102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d475-7158-45a4-9f2e-4f7302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 15:37:01",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d475-6c70-4d55-90f2-4b7802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f7e44f2c-acce-4a13-bb4f-7a8a3f561f6a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:05.000Z",
"modified": "2018-03-13T13:39:05.000Z",
"pattern": "[file:hashes.MD5 = '4451d527ee8f08e855da571753196231' AND file:hashes.SHA1 = '3e3dfe6488ab0ea0d2b11bd97435d00c32c0cbe4' AND file:hashes.SHA256 = '27804dda3c5bb183970cc7c38ef0ebce44be5f9f0ffeea4f224bc5b7fa91953c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1bdd2424-ec61-48b5-b0fc-cfe234973c69",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:03.000Z",
"modified": "2018-03-13T13:39:03.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/27804dda3c5bb183970cc7c38ef0ebce44be5f9f0ffeea4f224bc5b7fa91953c/analysis/1519911764/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d477-3a6c-4671-988d-43a502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "24/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d478-b16c-455e-9eb2-4bf202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-01 13:42:44",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d478-7fb0-47e8-a63a-487902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--860df4c8-2d41-4fc7-b3fc-abea9a79399a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:07.000Z",
"modified": "2018-03-13T13:39:07.000Z",
"pattern": "[file:hashes.MD5 = 'e7e58f34bfbf97f1b6675022b072ccb9' AND file:hashes.SHA1 = '4d8fecf211cdabac32d6157ed138cfdb637626f4' AND file:hashes.SHA256 = 'd13459e6a495ecac9e21b95354ad12c22203c9f7cf87390388ad15a9cd21b5f4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--cd3742e9-9515-451b-9d86-0900994ffe1e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:05.000Z",
"modified": "2018-03-13T13:39:05.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d13459e6a495ecac9e21b95354ad12c22203c9f7cf87390388ad15a9cd21b5f4/analysis/1518195325/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d479-b75c-48b6-abaf-46dc02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d47a-5768-41c7-a353-491802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-09 16:55:25",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d47a-6378-4394-b31d-488802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f2bf99ab-22ca-42a8-ade9-dd3259513e1d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:09.000Z",
"modified": "2018-03-13T13:39:09.000Z",
"pattern": "[file:hashes.MD5 = '1ee0336e030dc9d11b09d43f33cdb9ed' AND file:hashes.SHA1 = 'cf76616a5b3a58055407d69df9e2ebbba460ed48' AND file:hashes.SHA256 = 'ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f7a2f44d-913b-412f-8a87-29015a121194",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:08.000Z",
"modified": "2018-03-13T13:39:08.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ff10e852973c6675fa1f623eb27ff70306ba607a25c976d78d9396731205ec0e/analysis/1520441582/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d47c-1828-4c0e-abcc-428b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d47c-015c-4316-915d-48ba02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:53:02",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d47c-ac20-4d5e-840e-4c0702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3cdbd820-ccfe-4805-a87f-66639a605863",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:12.000Z",
"modified": "2018-03-13T13:39:12.000Z",
"pattern": "[file:hashes.MD5 = 'b34ddb4c2617adc0eec48099285cae2e' AND file:hashes.SHA1 = '81db78b6ed310993a3e524bcf0a83ecd1ffda836' AND file:hashes.SHA256 = '515651cc16fe74451eee5d02ed357a2cf41c5f05ef81140620f1f472fb3043bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d295ca83-4c3b-44e9-bf94-8ea103e0ca84",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:10.000Z",
"modified": "2018-03-13T13:39:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/515651cc16fe74451eee5d02ed357a2cf41c5f05ef81140620f1f472fb3043bb/analysis/1520438619/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d47e-91f4-47bf-9789-4f1f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "38/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d47e-e238-4402-aa16-400f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:03:39",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d47f-edac-4630-bda6-41da02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5282a1ef-c68b-441b-b128-7b98762c7db5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:14.000Z",
"modified": "2018-03-13T13:39:14.000Z",
"pattern": "[file:hashes.MD5 = '113920d295806c64d572d3fdfdcde155' AND file:hashes.SHA1 = '7eed79144d9d22e809bb7242e38fe47f5bbae44d' AND file:hashes.SHA256 = 'bcdefbeb609a3d839518b3fe9d77b138e4b8a7f3208e963650a5a2aac6373e25']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--52b803c3-0c4c-414f-ab7f-61c009b4c3f9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:12.000Z",
"modified": "2018-03-13T13:39:12.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/bcdefbeb609a3d839518b3fe9d77b138e4b8a7f3208e963650a5a2aac6373e25/analysis/1517717913/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d480-9890-456b-b00c-418402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d481-afdc-455a-81f3-47fd02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-04 04:18:33",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d481-cfa8-46a2-bc2e-4b5802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ffee8c30-fe29-4c86-9b73-30c567bf8611",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:16.000Z",
"modified": "2018-03-13T13:39:16.000Z",
"pattern": "[file:hashes.MD5 = 'b2f0dc03faa5492668a2ab6f737bf580' AND file:hashes.SHA1 = '458e9d74dd774b3c259a88ba140c03d258d31f51' AND file:hashes.SHA256 = '79f9cb65e970ea7d4d6ad21a3ee13a7ba356aaf355d67c5a4e75495f8544a0d7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6d666a98-8722-41c6-951c-010645d867ea",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:14.000Z",
"modified": "2018-03-13T13:39:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/79f9cb65e970ea7d4d6ad21a3ee13a7ba356aaf355d67c5a4e75495f8544a0d7/analysis/1520439321/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d483-a450-4e89-9634-4b3502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "24/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d483-ee0c-4103-a713-451602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:15:21",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d483-336c-4fda-b9c3-414602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8e10aae3-e3c3-4fb9-8871-64897fb41a12",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:18.000Z",
"modified": "2018-03-13T13:39:18.000Z",
"pattern": "[file:hashes.MD5 = '98798444d0a29911186490377d81b4d7' AND file:hashes.SHA1 = 'e338463a931584f91a86a39a975167b8ed296261' AND file:hashes.SHA256 = '1c41511f967771ab8fbd4c96a857637efbb88b4d86d180c7bbd31fc748890d27']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--51bf0041-0608-40d2-a4b8-dac196a75558",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:17.000Z",
"modified": "2018-03-13T13:39:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/1c41511f967771ab8fbd4c96a857637efbb88b4d86d180c7bbd31fc748890d27/analysis/1510538758/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d485-87b0-45db-af73-4fd402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/65",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d485-2b6c-48c6-aeb2-45d602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-13 02:05:58",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d485-ee5c-4637-9ecd-46d602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a95ad9c-9614-4175-9c77-307846c62223",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:21.000Z",
"modified": "2018-03-13T13:39:21.000Z",
"pattern": "[file:hashes.MD5 = '282cff5cbced7c1993c0d48bf294e8e4' AND file:hashes.SHA1 = 'f5ed24c74bce1dd3201f5d3a3271c9e5fb26e5c1' AND file:hashes.SHA256 = '24829d1c8611a0ac01fc8139fbda91f52e76da46b9219044f70917c03b186be6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1c9db02b-c9a4-4f2d-8e66-4d1116798eb4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:19.000Z",
"modified": "2018-03-13T13:39:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/24829d1c8611a0ac01fc8139fbda91f52e76da46b9219044f70917c03b186be6/analysis/1520437741/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d487-5984-4cd3-8bec-48bd02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d488-c7d4-417f-9fbf-4c2302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:49:01",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d488-4e48-4b6f-9927-405b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e709461d-0ae6-468d-87eb-63960bd22851",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:23.000Z",
"modified": "2018-03-13T13:39:23.000Z",
"pattern": "[file:hashes.MD5 = '672104a5544738f88e98ca2dcadf15b5' AND file:hashes.SHA1 = 'c9dd0aa112ed4fda6fdfb13e9a7b17843ee58407' AND file:hashes.SHA256 = 'e9f64d3adddf546b49d2281519c8ada60cfbb3abd6b66a6ba25992cd6627ad26']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--30dce96c-9cdd-40ea-8945-b106b9b4a3b2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:22.000Z",
"modified": "2018-03-13T13:39:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e9f64d3adddf546b49d2281519c8ada60cfbb3abd6b66a6ba25992cd6627ad26/analysis/1514641250/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d48a-0914-48d2-bd46-4a5602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "23/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d48a-13f0-4889-a376-487102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-30 13:40:50",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d48a-f5a8-4f70-b1e0-435c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--21ebf0fd-7772-45af-b54c-abc5df09ea6f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:26.000Z",
"modified": "2018-03-13T13:39:26.000Z",
"pattern": "[file:hashes.MD5 = 'f8a8643164f2ed8413b88540b540440f' AND file:hashes.SHA1 = 'd814c0bff821ba4478f10f562c26ac47e0d0128b' AND file:hashes.SHA256 = '87ae0ce6d13939d0f048889d02da0f7faecd7707705b05b387b8e2cffaea5312']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--90930896-570d-4f08-9767-9299e3e25f8c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:24.000Z",
"modified": "2018-03-13T13:39:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/87ae0ce6d13939d0f048889d02da0f7faecd7707705b05b387b8e2cffaea5312/analysis/1520913599/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d48c-e420-4e9a-ab90-482e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d48c-8d04-4709-a0f8-41ae02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:59:59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d48c-0c9c-461a-8a79-48f602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--db0cef85-c247-4270-a64b-cfc6208435b7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:28.000Z",
"modified": "2018-03-13T13:39:28.000Z",
"pattern": "[file:hashes.MD5 = '461b57e5434e0d87d2f673815cd1285e' AND file:hashes.SHA1 = '0757b4581ac588ed47a7349fcf71c931c26631b3' AND file:hashes.SHA256 = '9094ab3ff3c91dfe6228bf3d225433b16442047fa63ed5e00f15dffc5676dac6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--617a92ab-8635-4f5e-80c9-a714809d0592",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:26.000Z",
"modified": "2018-03-13T13:39:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9094ab3ff3c91dfe6228bf3d225433b16442047fa63ed5e00f15dffc5676dac6/analysis/1520439929/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d48e-1f38-4ba4-86b7-4a0702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d48f-38a8-4f1e-8897-483002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:25:29",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d48f-21b8-4f60-9cbb-4b5902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--73918517-e510-4af0-a019-bf2bee56493f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:30.000Z",
"modified": "2018-03-13T13:39:30.000Z",
"pattern": "[file:hashes.MD5 = '3e4c773475d8df2d1da72180e574f37a' AND file:hashes.SHA1 = '600473e6100efc02af9220f7c33f83ad65112d27' AND file:hashes.SHA256 = '0b2a23066f3601cfcc99b7555a552807946c3da8c0a8519f52b4175e72828c31']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--49ea5f6c-b55f-42f9-aa76-b9d21ef849da",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:28.000Z",
"modified": "2018-03-13T13:39:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0b2a23066f3601cfcc99b7555a552807946c3da8c0a8519f52b4175e72828c31/analysis/1520437366/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d491-7eec-46dc-931d-481602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d491-69c0-426d-bf00-4e8f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:42:46",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d491-e848-4943-a45d-483602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--aef2b037-4ed7-4588-8cde-a018c637147c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:33.000Z",
"modified": "2018-03-13T13:39:33.000Z",
"pattern": "[file:hashes.MD5 = '2423cad996dfbacdf410f73d2498690a' AND file:hashes.SHA1 = 'c4529be3f68f616a53055c13b98519bd0b253128' AND file:hashes.SHA256 = '869d9b7e5f9f9c79e33e359c131639b870aaf6e673ffe6b05ae57f4de3bee7c1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a3c0c9b1-aa83-4af5-be53-f932ccf256bb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:31.000Z",
"modified": "2018-03-13T13:39:31.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/869d9b7e5f9f9c79e33e359c131639b870aaf6e673ffe6b05ae57f4de3bee7c1/analysis/1517469488/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d493-2ce0-4b0d-bfb5-4b0202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "26/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d494-0044-42fe-9e75-419402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-01 07:18:08",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d494-98a0-4ab0-80d5-436602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--62d5dec4-9817-4b1a-bb14-609a1b6758a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:35.000Z",
"modified": "2018-03-13T13:39:35.000Z",
"pattern": "[file:hashes.MD5 = '018e3c2fa91be513e3bdd1642b576579' AND file:hashes.SHA1 = '736292176ccdca2e2ad5d70da4f4f873b6e40ced' AND file:hashes.SHA256 = '11aa9301346258b1e950607dfdb37eabf874e93406c1454c9a4bc905d1ccf925']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--629868f3-c236-41a5-a066-de88f0bc5754",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:33.000Z",
"modified": "2018-03-13T13:39:33.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/11aa9301346258b1e950607dfdb37eabf874e93406c1454c9a4bc905d1ccf925/analysis/1519376346/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d495-d784-4176-881a-42f902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d496-4a08-4727-a281-4eda02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-23 08:59:06",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d496-f4c0-4065-accf-427202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5453664b-9768-452f-80d9-b9a02391183d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:37.000Z",
"modified": "2018-03-13T13:39:37.000Z",
"pattern": "[file:hashes.MD5 = '6c918642ed55f5aed93a4a49b43c2865' AND file:hashes.SHA1 = '7192ef47502bd1ccd8554a0a4cf0b4e18c2544a7' AND file:hashes.SHA256 = '3342a7b78e6e3cd56c7abd51e1c66f94cf37fd5ec8fc7eef2c8905b00f96d69c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--588bfd9d-f8dc-46b6-8229-c99a0a18fa93",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:35.000Z",
"modified": "2018-03-13T13:39:35.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3342a7b78e6e3cd56c7abd51e1c66f94cf37fd5ec8fc7eef2c8905b00f96d69c/analysis/1463787328/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d498-0408-435e-933f-438402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "43/57",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d498-f89c-49ab-be6c-435002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2016-05-20 23:35:28",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d498-221c-40e1-8ba8-48ea02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--76e97e10-38c3-41c9-a84d-5614621238d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:39.000Z",
"modified": "2018-03-13T13:39:39.000Z",
"pattern": "[file:hashes.MD5 = '8a0ec9cd97b84b45be7c72601e625656' AND file:hashes.SHA1 = '7e09feadb08692ae98f1d5c7effb0074acbfe93a' AND file:hashes.SHA256 = 'd4e793361db4e58aaf534f93b57e4ae5e2e53583caebede11522cb757e29696c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--281801c2-274e-4e56-9cce-7547583867fd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:38.000Z",
"modified": "2018-03-13T13:39:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d4e793361db4e58aaf534f93b57e4ae5e2e53583caebede11522cb757e29696c/analysis/1515019478/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d49a-4ed4-4d11-9795-4f6a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d49a-9b54-49ca-a331-412902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 22:44:38",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d49a-79b8-44b3-9d2d-469d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--993c1778-6454-40b9-bf98-e2c2993d751c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:41.000Z",
"modified": "2018-03-13T13:39:41.000Z",
"pattern": "[file:hashes.MD5 = '54a65804bbc30628dc9000ae727d5d33' AND file:hashes.SHA1 = '02602936fbca7c3f27e0ce476121c55b369b6121' AND file:hashes.SHA256 = '7aee0d6cba97a15b3b86b5be47b741dedc718fdcc6975a37875ce9de5db437fe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--99fd2972-6ddc-4f44-86bf-cf3cdee3d8dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:40.000Z",
"modified": "2018-03-13T13:39:40.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7aee0d6cba97a15b3b86b5be47b741dedc718fdcc6975a37875ce9de5db437fe/analysis/1520376525/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d49c-dd44-4f5c-b2f1-47be02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d49c-9a74-4f48-8b28-4cf102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:45",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d49d-f398-4bc7-90b7-4d3402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--629083e5-c228-4a5f-ab26-905d65f29816",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:44.000Z",
"modified": "2018-03-13T13:39:44.000Z",
"pattern": "[file:hashes.MD5 = 'abfe0c27307297645dd04d427d28a952' AND file:hashes.SHA1 = '2d2849c57e3deb0347cb3a718d731fad335c433d' AND file:hashes.SHA256 = 'f9c8bdf92cbd751f35f902fc48760de7d75248742708c9ce95f748273c8f2a4f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--30fc814c-16cf-402d-8af4-b1b42f1f0670",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:43.000Z",
"modified": "2018-03-13T13:39:43.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f9c8bdf92cbd751f35f902fc48760de7d75248742708c9ce95f748273c8f2a4f/analysis/1511352248/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d49f-be2c-4d8e-b812-428702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d49f-2830-4d41-9f3a-401402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-22 12:04:08",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d49f-404c-4da8-8315-4f4a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--973eccaa-c84b-4e8a-acdc-20fb1cced3d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:47.000Z",
"modified": "2018-03-13T13:39:47.000Z",
"pattern": "[file:hashes.MD5 = 'ce1a8c90a640d4081afce312f5b63a7b' AND file:hashes.SHA1 = '849466b52c51a87671829e82455f07a88b2d462b' AND file:hashes.SHA256 = '8935407185ddc8197b8cd84239faa2ab31e87178ec0c7ad0205a4bb6a8bca6f6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3bc155aa-8c8a-4ad9-a170-238d59cd6423",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:45.000Z",
"modified": "2018-03-13T13:39:45.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8935407185ddc8197b8cd84239faa2ab31e87178ec0c7ad0205a4bb6a8bca6f6/analysis/1520488528/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4a1-d57c-498c-ab6f-409602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4a1-6804-47f4-8d8c-43f902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:55:28",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4a1-3808-4b15-8934-4a5602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9669a60a-a564-40cc-90f3-6a0619ddf84b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:49.000Z",
"modified": "2018-03-13T13:39:49.000Z",
"pattern": "[file:hashes.MD5 = '33a0188d72cde29c15116de017e11961' AND file:hashes.SHA1 = 'c766b13c0ea08b74135235407766b63e18c991e4' AND file:hashes.SHA256 = '34bf67c997bf5b450a13538ea540080a1c97fff1c7453d497acf28539cf82464']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7472369f-9901-4c09-bfb1-244c7d70e65e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:47.000Z",
"modified": "2018-03-13T13:39:47.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/34bf67c997bf5b450a13538ea540080a1c97fff1c7453d497acf28539cf82464/analysis/1520438031/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4a4-44dc-4812-be92-4f2d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4a4-fed0-4308-83d8-4c4202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:53:51",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4a4-5fd4-4f09-96d4-4c1002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f9456adf-90ba-400d-ba2a-f34cd7f929d0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:51.000Z",
"modified": "2018-03-13T13:39:51.000Z",
"pattern": "[file:hashes.MD5 = 'c1fbad7bd2351ab8323b12199998d2ac' AND file:hashes.SHA1 = 'fb53d29c6b026089a8c13ec5d1dcfc33112edd50' AND file:hashes.SHA256 = 'b34964eff2f2c8f85c4ed710d0eab0e40c0268447a703bc277ee016e804c79b4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c51d359b-36fa-4a3f-8c24-f31adb564a9a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:50.000Z",
"modified": "2018-03-13T13:39:50.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b34964eff2f2c8f85c4ed710d0eab0e40c0268447a703bc277ee016e804c79b4/analysis/1466483930/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4a6-5c84-46b7-8113-48d202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/56",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4a6-34d4-42cd-ac69-4f3a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2016-06-21 04:38:50",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4a6-b494-4328-a5c3-449902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eb54ed4e-6811-4c83-8aee-c334fee7214c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:54.000Z",
"modified": "2018-03-13T13:39:54.000Z",
"pattern": "[file:hashes.MD5 = 'e571be01ba923680e39064b3ce1ad342' AND file:hashes.SHA1 = '35924a68cc4f15eaa33e0be9d8e5b5c34448753c' AND file:hashes.SHA256 = '4cb074da79840e68901060afb79029b8eedd2ea6c803eb0c44dd46bad2cd4b45']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4966f0ba-fea3-4837-b833-8f9a5d41d38e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:52.000Z",
"modified": "2018-03-13T13:39:52.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4cb074da79840e68901060afb79029b8eedd2ea6c803eb0c44dd46bad2cd4b45/analysis/1518194996/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4a8-ec44-421a-b630-456a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "45/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4a9-348c-4011-bcd8-41db02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-09 16:49:56",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4a9-b2a4-466a-a757-416102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5f4d9667-75ad-4a32-9e13-ad54428acb2b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:56.000Z",
"modified": "2018-03-13T13:39:56.000Z",
"pattern": "[file:hashes.MD5 = 'c82801ac3f8651f0669b63de2fbf70e8' AND file:hashes.SHA1 = '7aa64f41515a95fc1df84e5cb9afb97afabd073e' AND file:hashes.SHA256 = '07c2f262f84c7013cb83f25027e86d308f6a7867cb777b978ddd78e999fab187']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a91d690d-70d7-4949-bfb0-6067f001a596",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:55.000Z",
"modified": "2018-03-13T13:39:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/07c2f262f84c7013cb83f25027e86d308f6a7867cb777b978ddd78e999fab187/analysis/1520437230/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4ab-0b14-4c19-879e-400202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4ab-f35c-45e6-893f-4abe02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:40:30",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4ab-95b8-4ea1-b3c1-41c702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9041116a-b6b5-4d5c-a565-d6178035272b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:59.000Z",
"modified": "2018-03-13T13:39:59.000Z",
"pattern": "[file:hashes.MD5 = '1f666fae6ac29facbea7b29a68f92964' AND file:hashes.SHA1 = 'cbc68d223976399fafcaec118e40263f1b7c4a87' AND file:hashes.SHA256 = '817daa9d76d0dc834cd63c905703412f3c749c91f4e79945427bc713a18cc5cb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:39:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--848f6b87-3abc-4578-a29d-3d36b95393df",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:57.000Z",
"modified": "2018-03-13T13:39:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/817daa9d76d0dc834cd63c905703412f3c749c91f4e79945427bc713a18cc5cb/analysis/1520488511/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4ad-40ac-4c9b-8ff6-448502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4ad-9628-40df-aac2-4c4602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:55:11",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4ad-b4f0-4f6b-8f81-47bd02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9f28f790-484f-41c7-98fd-19c53a5784ad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:01.000Z",
"modified": "2018-03-13T13:40:01.000Z",
"pattern": "[file:hashes.MD5 = '847994b3a270208c427f6a8584fe494d' AND file:hashes.SHA1 = '079cfe48c45f90318bb4c819b246957b7be10e1a' AND file:hashes.SHA256 = 'c0296ba94b4445a4e3be227a31d3ccba011ebb358e93224a5141f53e9f6ec832']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ccefa011-af8a-4a21-ae83-32e24a2bcf5d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:39:59.000Z",
"modified": "2018-03-13T13:39:59.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/c0296ba94b4445a4e3be227a31d3ccba011ebb358e93224a5141f53e9f6ec832/analysis/1519825446/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4af-4a14-4493-becd-4cf002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "25/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4b0-d24c-44c4-87fc-4a8502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-28 13:44:06",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4b0-76b4-48df-9b73-40fc02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--20a1faef-5b03-4328-a877-a6d9ecce874d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:03.000Z",
"modified": "2018-03-13T13:40:03.000Z",
"pattern": "[file:hashes.MD5 = '249a5fb9382f9b42fc5b09c14cfb469e' AND file:hashes.SHA1 = '2b3a9ad7772c5592c2ecb4380bada0ee52000b56' AND file:hashes.SHA256 = 'bafb6b31625dac34208b40dfbd0d61632a0096e8eac5220e80c4b8225fcb5b61']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d3df38dc-94a4-490a-a393-30f28bb71c2a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:02.000Z",
"modified": "2018-03-13T13:40:02.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/bafb6b31625dac34208b40dfbd0d61632a0096e8eac5220e80c4b8225fcb5b61/analysis/1520855160/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4b2-a8bc-4a91-b4ac-4e4d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4b2-2904-47fa-b3ab-413a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 11:46:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4b2-ab0c-482e-890b-4dd902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--62f011a5-158a-4e17-9274-373a8afa7f89",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:06.000Z",
"modified": "2018-03-13T13:40:06.000Z",
"pattern": "[file:hashes.MD5 = '8cf8cd4a3befdb12261674987279d455' AND file:hashes.SHA1 = '2dd5c1be6b8b31ed18e6eb1496ac7e63e938cf8c' AND file:hashes.SHA256 = '379c6ededb129c04d6cb3feb76bae8f403e12c2309cc0b26514ced95e154be0d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fd076d81-b315-4442-825d-b43dd7931e58",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:04.000Z",
"modified": "2018-03-13T13:40:04.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/379c6ededb129c04d6cb3feb76bae8f403e12c2309cc0b26514ced95e154be0d/analysis/1520438138/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4b4-0b24-40f3-b643-4b4902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4b5-b158-4878-bc52-4b6902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:55:38",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4b5-e844-4e36-b5bf-431f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2910e51e-9648-4e47-afdf-a4e987e19b36",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:08.000Z",
"modified": "2018-03-13T13:40:08.000Z",
"pattern": "[file:hashes.MD5 = 'cbadd4db74b440b6d24c2c6fb7fd9944' AND file:hashes.SHA1 = '14b303d1dc690a8b7494cdd5641ae2114d90e618' AND file:hashes.SHA256 = '316c77088d181a3dc4021ac2631fd1531f9a9602db70b90fe6901170ebe43c82']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--de7ed8dc-8696-458b-bb57-f9f9108072ec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:06.000Z",
"modified": "2018-03-13T13:40:06.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/316c77088d181a3dc4021ac2631fd1531f9a9602db70b90fe6901170ebe43c82/analysis/1520437926/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4b6-d3a0-4122-bb02-4d0f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4b7-da48-4572-81b1-499502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:52:06",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4b7-cfe0-44cd-b8cf-4d9d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1784ba3-1ef0-4d79-8079-c9dc92251090",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:10.000Z",
"modified": "2018-03-13T13:40:10.000Z",
"pattern": "[file:hashes.MD5 = 'a494c62d136444826d33af373c59305c' AND file:hashes.SHA1 = '31082b96d15f45cc5408ad044ba03191a4bab937' AND file:hashes.SHA256 = '903b1d2fc5f0fd013506915bf31dccf18f96a12efbfa89fa0f27410b98197518']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--122ea312-54ee-42c9-9246-5a1b4c5d6e9d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:09.000Z",
"modified": "2018-03-13T13:40:09.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/903b1d2fc5f0fd013506915bf31dccf18f96a12efbfa89fa0f27410b98197518/analysis/1520439877/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4b9-2ad4-439f-a514-4cc902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "26/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4b9-9f58-4b04-a8e5-401a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:24:37",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4b9-ce2c-415f-9529-495302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f30501a4-1ca7-4609-957b-15efbfab4c35",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:13.000Z",
"modified": "2018-03-13T13:40:13.000Z",
"pattern": "[file:hashes.MD5 = '2938c7b076107ec91b55067eb4d46a36' AND file:hashes.SHA1 = '9cc180d0c4da14cf4458f2f493401b8a7127f265' AND file:hashes.SHA256 = 'ad5c791ae004cbb1aea0a71fe2f8bc014cba005e8a20e16042dd4f41169dede0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d9686b2d-97a4-4279-908e-a465007070a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:11.000Z",
"modified": "2018-03-13T13:40:11.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ad5c791ae004cbb1aea0a71fe2f8bc014cba005e8a20e16042dd4f41169dede0/analysis/1520440417/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4bb-dcd0-46a7-83cc-4f7402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4bc-8a74-4e27-9997-471e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:33:37",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4bc-1794-4145-9b3f-4f8502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6f94cdef-c5a9-409d-9fa3-8a13133ff47f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:15.000Z",
"modified": "2018-03-13T13:40:15.000Z",
"pattern": "[file:hashes.MD5 = '20bbe0b3c44e4a1c22f477cc307cd692' AND file:hashes.SHA1 = 'e20eab5e4cd632697a7cac30ce2a52647ae2fba4' AND file:hashes.SHA256 = '5e3b091d32b67cff249bb8667e12b6adb3c9f3315fa4d0e6e0af0924fa5306ff']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4012a76c-de18-4390-a286-2c83696b393d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:14.000Z",
"modified": "2018-03-13T13:40:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5e3b091d32b67cff249bb8667e12b6adb3c9f3315fa4d0e6e0af0924fa5306ff/analysis/1520906580/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4be-3fb4-4888-87e8-493002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4be-d138-4822-bb4f-470002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 02:03:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4be-ac84-46db-a1b7-4b1302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4b6c97d5-3fe1-4419-bf6b-f179e663bcd1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:18.000Z",
"modified": "2018-03-13T13:40:18.000Z",
"pattern": "[file:hashes.MD5 = '3fa8aff4bee5e496da00a7d7016ebded' AND file:hashes.SHA1 = '0180058cec0053a7fde6136f36d1c4acb58ddbc5' AND file:hashes.SHA256 = '275136e4983e309d584ec088ee369634b3761fef163a8e6cce709699775d9ac9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9fa6c908-2ff0-4298-aa58-9fed29b6621c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:16.000Z",
"modified": "2018-03-13T13:40:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/275136e4983e309d584ec088ee369634b3761fef163a8e6cce709699775d9ac9/analysis/1520376509/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4c0-2d68-4ab4-ba64-491902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4c1-cee4-4898-8643-48eb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:29",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4c1-b8b0-4289-8fdc-4f1e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5f5a9bef-cbc2-4048-a584-02fe6b323301",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:21.000Z",
"modified": "2018-03-13T13:40:21.000Z",
"pattern": "[file:hashes.MD5 = '2c90625f84a51b57e75049beee698252' AND file:hashes.SHA1 = 'a1cb2dfc25dcaa41ecf093c85187f25aec2f6227' AND file:hashes.SHA256 = 'fe18a882867fd6725bc5c3afc0f8b7e9a81383d7c8baf30dec362c4eb2c95ccb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d4ce528e-6e53-4462-8b4d-bf43bcf7a122",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:19.000Z",
"modified": "2018-03-13T13:40:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/fe18a882867fd6725bc5c3afc0f8b7e9a81383d7c8baf30dec362c4eb2c95ccb/analysis/1517406490/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4c3-5e90-4a3f-8151-4f8e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "25/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4c3-d71c-46d0-9584-4af602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-31 13:48:10",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4c3-b8e8-4e77-84c7-4fae02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3c44b011-cea0-49e8-b582-fad55d1d8af1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:23.000Z",
"modified": "2018-03-13T13:40:23.000Z",
"pattern": "[file:hashes.MD5 = '12bd99e213dde873df85220a804b7074' AND file:hashes.SHA1 = '5cbccc5f682dff953ab270449420ce74324473c7' AND file:hashes.SHA256 = '60fe04943eb87375122a70d1672722e7700394c5d7427660bae1c44d902e2017']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d9f6f916-1093-437b-9010-23a6d7ba2770",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:21.000Z",
"modified": "2018-03-13T13:40:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/60fe04943eb87375122a70d1672722e7700394c5d7427660bae1c44d902e2017/analysis/1520376442/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4c5-b910-4ce1-9902-4e4902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4c5-8008-487a-81bc-41f102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:22",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4c5-ac04-4804-856f-4d7802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--262143f5-8e2c-48f0-a7ff-98463168dc27",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:25.000Z",
"modified": "2018-03-13T13:40:25.000Z",
"pattern": "[file:hashes.MD5 = '223b43c3adf88f89c86c1f1e6da1d2e3' AND file:hashes.SHA1 = '80ddd53193e956dfdace98b42e3d085ec94c7edd' AND file:hashes.SHA256 = 'f85cdff7982cdd06bfd1deea928678ebc6d83625a2f5090f094153312e914849']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b1bd6e18-7266-4a67-b549-1177d939703d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:23.000Z",
"modified": "2018-03-13T13:40:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f85cdff7982cdd06bfd1deea928678ebc6d83625a2f5090f094153312e914849/analysis/1520441449/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4c7-b24c-4ef3-984e-4dcb02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4c8-5ae0-4ecb-9831-426202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:50:49",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4c8-e5a0-4a99-8e5f-481502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4778b0bb-ca98-4bd7-8f8a-5d408f3cff9e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:27.000Z",
"modified": "2018-03-13T13:40:27.000Z",
"pattern": "[file:hashes.MD5 = '11a2845638b2617c96c091134d3623d3' AND file:hashes.SHA1 = 'ee543915a0f55982623e03ebc2494643aa035bc4' AND file:hashes.SHA256 = '34f6bf5de0b379b5cc3218c3b81c23fa590ebbe4488d35fdb5ba241ce6d3811b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4006abea-7694-4809-ad2f-f5b1d0b8648a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:25.000Z",
"modified": "2018-03-13T13:40:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/34f6bf5de0b379b5cc3218c3b81c23fa590ebbe4488d35fdb5ba241ce6d3811b/analysis/1520438084/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4ca-2b90-4bca-9a11-4d7502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4ca-f6a0-44d2-9b99-42f002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:54:44",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4ca-c07c-4531-ba51-4a0e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c8f23cd0-337b-4520-b4d3-c7b053601507",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:30.000Z",
"modified": "2018-03-13T13:40:30.000Z",
"pattern": "[file:hashes.MD5 = '2d49df6e7d6c465eee74cc77badd45db' AND file:hashes.SHA1 = 'b26bf9cd64dd74e1be47772d4ece92d2b0be745e' AND file:hashes.SHA256 = '0390956e3c62dad776147b6661fc5dbcd8d585027f7fd530e7b0428007b43197']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--17da1ccf-d4c1-4428-8404-8d3659d59793",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:28.000Z",
"modified": "2018-03-13T13:40:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0390956e3c62dad776147b6661fc5dbcd8d585027f7fd530e7b0428007b43197/analysis/1513807882/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4cc-31b0-46ac-a58a-4b5402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "43/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4cc-f5b0-48dd-b61d-41bd02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-20 22:11:22",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4cc-5ec0-441f-b401-409c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b01eed1e-c2f3-4a55-ae9e-c38e8d385f0a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:32.000Z",
"modified": "2018-03-13T13:40:32.000Z",
"pattern": "[file:hashes.MD5 = 'a7efde4e103890f2974ab7e9eab9d1c2' AND file:hashes.SHA1 = '9f9d34ff665c799ae2ec996796f5f7b18d7500f8' AND file:hashes.SHA256 = 'bb06ec141b6382a111c20c70898b161f2287dda44a7024b949cc91fab1d3ca62']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b544c25d-094a-4b2b-a6dd-14b6ace52836",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:30.000Z",
"modified": "2018-03-13T13:40:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/bb06ec141b6382a111c20c70898b161f2287dda44a7024b949cc91fab1d3ca62/analysis/1520440866/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4ce-f644-4ca2-8a02-43b902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4cf-6380-45d7-a64b-41d702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:41:06",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4cf-76d0-46f4-b045-481502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7fe8a7d6-0855-42f6-9a14-b2824acfb3b4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:34.000Z",
"modified": "2018-03-13T13:40:34.000Z",
"pattern": "[file:hashes.MD5 = '8da11c7503a0054f90db43dd73dda94b' AND file:hashes.SHA1 = '4147d86b5939bf8e77e2126c8edc64f573bc1c36' AND file:hashes.SHA256 = 'd11b980ada1634b17462c05c4f2ade8894f2267b254038aa27fddbf2e2f4c850']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--42755064-ba05-4f91-b78f-689be27b717e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:32.000Z",
"modified": "2018-03-13T13:40:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d11b980ada1634b17462c05c4f2ade8894f2267b254038aa27fddbf2e2f4c850/analysis/1516110549/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4d1-149c-4d4f-a6b2-447502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4d1-5ba0-43cc-9490-462f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-16 13:49:09",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4d1-a628-4a08-b1c9-49a502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7515eaf4-b764-46a3-b4bb-a9dd4669c17e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:36.000Z",
"modified": "2018-03-13T13:40:36.000Z",
"pattern": "[file:hashes.MD5 = '5250498499d2bf02620df74117baf476' AND file:hashes.SHA1 = '9f1c2ba4061f9e527f85c1aa0573c9577f82a3fb' AND file:hashes.SHA256 = 'e985205932309edce7ea1130d1a3ba169a8b9b5a84c890e01633e45aa7b76e0e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fc459030-58b1-4629-8287-71eb17a46f1f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:35.000Z",
"modified": "2018-03-13T13:40:35.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e985205932309edce7ea1130d1a3ba169a8b9b5a84c890e01633e45aa7b76e0e/analysis/1520913607/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4d3-0b60-4257-82db-440902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4d3-d078-4ea5-964a-4abf02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 04:00:07",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4d3-4034-4649-b9dd-407e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0c710fd7-5c24-4156-80af-9ce1133f1b34",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:39.000Z",
"modified": "2018-03-13T13:40:39.000Z",
"pattern": "[file:hashes.MD5 = '9287dd4943e726a2b0ac709e316c32c3' AND file:hashes.SHA1 = '930b443b254184694da7d588bddff205c884e47f' AND file:hashes.SHA256 = '8d0aae0b927fcf6e3162d95b1038fac8281432f4f94fc294472ad3d7d1457929']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--59ee90d1-bae4-42a5-9686-5f2ad4cb8007",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:37.000Z",
"modified": "2018-03-13T13:40:37.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8d0aae0b927fcf6e3162d95b1038fac8281432f4f94fc294472ad3d7d1457929/analysis/1520439772/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4d5-6e38-465e-97d8-4c1802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4d6-c23c-4590-a7d3-439302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:22:52",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4d6-9484-4d92-a7a5-48eb02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1f4e9c0c-d4b9-4b41-b50e-95a86e12635f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:41.000Z",
"modified": "2018-03-13T13:40:41.000Z",
"pattern": "[file:hashes.MD5 = 'bcb8916f215dab1aca9eeff0092ebf4f' AND file:hashes.SHA1 = '542a1d3459350c9086f66ae87e561d9fcfcfcafc' AND file:hashes.SHA256 = '0084b71d5f3c558f05d887cd2843e6d15b77924144beb619e75e9be445d326c4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c60414fe-d8a1-485f-b326-ec39137346c4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:39.000Z",
"modified": "2018-03-13T13:40:39.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0084b71d5f3c558f05d887cd2843e6d15b77924144beb619e75e9be445d326c4/analysis/1520376413/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4d7-a338-42e8-9869-4e6f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4d8-e2d8-40b5-8dd9-4fe202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:46:53",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4d8-6cd0-4a34-b571-456b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--772a44aa-5648-43da-ae46-a43b0e51dede",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:43.000Z",
"modified": "2018-03-13T13:40:43.000Z",
"pattern": "[file:hashes.MD5 = '6e1e89c787c27e62567cc32ef684e013' AND file:hashes.SHA1 = '6c02d3acaafdb4f9765f062354bd6f226694f48a' AND file:hashes.SHA256 = 'fc88d645f9885abf4274e7ed18e555447da13ef2c88082fdf904c3b869ab2854']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8076f407-c7c6-42e5-9901-5ea7dca9e02c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:41.000Z",
"modified": "2018-03-13T13:40:41.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/fc88d645f9885abf4274e7ed18e555447da13ef2c88082fdf904c3b869ab2854/analysis/1520441555/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4da-e22c-4ac5-ae04-44db02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4da-41c4-438d-968e-4d1802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:52:35",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4da-3240-4705-bf33-409702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3842366a-678d-443f-83ba-e2523a409506",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:45.000Z",
"modified": "2018-03-13T13:40:45.000Z",
"pattern": "[file:hashes.MD5 = '6d64c1e20c8953304a76f313f0e36e8e' AND file:hashes.SHA1 = 'a83d6c9f14f0e5104492498fb98e91096ec9b9a0' AND file:hashes.SHA256 = 'b82fd4927cc9347513227a8b8d0a206a4678461b16c3acb5f6add2e5d1f089dd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0c7561b8-109e-4cde-85ee-0c5ceaa66987",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:44.000Z",
"modified": "2018-03-13T13:40:44.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b82fd4927cc9347513227a8b8d0a206a4678461b16c3acb5f6add2e5d1f089dd/analysis/1520440709/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4dc-05d0-4750-aa58-49c502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4dc-eca0-4d7f-bb9e-488802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:38:29",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4dc-6e68-40cf-9102-445402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6e33ec1b-4c4b-4ff2-9df3-e0ef2cf0d557",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:48.000Z",
"modified": "2018-03-13T13:40:48.000Z",
"pattern": "[file:hashes.MD5 = '350b607bad40d521cbfffcba0023d432' AND file:hashes.SHA1 = '1e733b782ae647c79e0097a3f1c150f4ecb7f863' AND file:hashes.SHA256 = 'c068b9246a31d99b810b253b7e92695108bcf27d253de4e4ac0aed3ab02e83ab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--68bfceef-61e7-40b2-8baf-9191f74d200c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:46.000Z",
"modified": "2018-03-13T13:40:46.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/c068b9246a31d99b810b253b7e92695108bcf27d253de4e4ac0aed3ab02e83ab/analysis/1520440945/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4de-208c-44ea-87a1-406002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4de-8798-4369-92ad-4f2b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:42:25",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4de-3778-49cf-87dd-454502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b41008c1-0bec-4725-b8fa-fb41541dedc0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:50.000Z",
"modified": "2018-03-13T13:40:50.000Z",
"pattern": "[file:hashes.MD5 = '01e8b8184f594ea70148ef453439a3cc' AND file:hashes.SHA1 = '775caca6da0c4afd6359b22beb2fb7a7e2ded241' AND file:hashes.SHA256 = '4949af73035869e28552272ed9c79511027ef026cb79d065f0775b50e1e5008b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e7aedbef-df58-4fa7-b32a-34eb2c0ed4e5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:48.000Z",
"modified": "2018-03-13T13:40:48.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4949af73035869e28552272ed9c79511027ef026cb79d065f0775b50e1e5008b/analysis/1520376435/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4e0-a1cc-4437-8be6-481c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4e1-781c-46cb-ba42-4df002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:15",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4e1-3418-4844-8815-42db02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a0ff86b1-25e6-4093-8971-dccc063f05a8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:52.000Z",
"modified": "2018-03-13T13:40:52.000Z",
"pattern": "[file:hashes.MD5 = 'c507c9bf763fa29ecce8b09e2987707d' AND file:hashes.SHA1 = '0d0ba39278fe0baea8c5b58777c98d9ec7dc8de6' AND file:hashes.SHA256 = 'a0cf68c10d1d9ce0e73208e6e6bad32b2405d2c74c662dc7b20f9b567c4dda64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--724bc7ba-ba88-4e5d-9c40-7676621f8735",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:50.000Z",
"modified": "2018-03-13T13:40:50.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a0cf68c10d1d9ce0e73208e6e6bad32b2405d2c74c662dc7b20f9b567c4dda64/analysis/1520440202/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4e2-b6a0-4e77-b68f-41c002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4e3-bbd4-4125-8625-43de02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:30:02",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4e3-7780-4791-8f2b-440e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1373fe1f-de01-4475-915b-6851db2f39e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:54.000Z",
"modified": "2018-03-13T13:40:54.000Z",
"pattern": "[file:hashes.MD5 = 'c2ac177a2399449ba13389429fc9b44a' AND file:hashes.SHA1 = '6c1b558e91ad4e48f2d6f4b997a52100d3648d24' AND file:hashes.SHA256 = 'ec58ed473d3c8fc3d6f4430930359436771de9291d58b30d67b333ef01d59dba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fc7f1e60-0b74-422a-809b-d51ccf402c0e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:52.000Z",
"modified": "2018-03-13T13:40:52.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ec58ed473d3c8fc3d6f4430930359436771de9291d58b30d67b333ef01d59dba/analysis/1514987186/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4e4-6384-4a10-8b29-4be602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4e5-d9c4-45e1-8978-4cda02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 13:46:26",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4e5-1538-42a3-bf76-48c502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c45f14db-dfbd-4555-b390-2276e6ff1ad2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:56.000Z",
"modified": "2018-03-13T13:40:56.000Z",
"pattern": "[file:hashes.MD5 = '9e9019bf73721932fae204e518434f9a' AND file:hashes.SHA1 = '615223858659a63d29e41606003fc2c099d24bf3' AND file:hashes.SHA256 = 'c4313ab89c3d94ab70185df327c664379490b263d47057543a5d7ab40e2ee588']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fae7c364-8729-429b-9ea9-3b31af0f3ea5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:55.000Z",
"modified": "2018-03-13T13:40:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/c4313ab89c3d94ab70185df327c664379490b263d47057543a5d7ab40e2ee588/analysis/1515072964/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4e7-4728-4ff5-bcac-475802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "27/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4e7-a548-42c7-868c-4e9802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-04 13:36:04",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4e7-bbb0-4ce1-a9fb-4e3d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56a2d91c-c23b-4c5e-b2e3-921244e87225",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:59.000Z",
"modified": "2018-03-13T13:40:59.000Z",
"pattern": "[file:hashes.MD5 = '2890d76aa512202353fb48e6b8107114' AND file:hashes.SHA1 = '8d143d2ae24883e6fa7c6b9da3b42081ebb8329a' AND file:hashes.SHA256 = 'e685b870f436c8bf4eda02666b99c02631ca165e90a122347929f3e1fff6dbe0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:40:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1e6b86c2-a47c-487a-9f37-325383622e1d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:57.000Z",
"modified": "2018-03-13T13:40:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e685b870f436c8bf4eda02666b99c02631ca165e90a122347929f3e1fff6dbe0/analysis/1520823924/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4e9-5f24-497f-8729-45d602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4e9-0f5c-4b78-87ac-455702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 03:05:24",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4e9-f098-4b46-998d-412a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6d17c059-317b-40e2-9085-4f8286e2d10e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:01.000Z",
"modified": "2018-03-13T13:41:01.000Z",
"pattern": "[file:hashes.MD5 = '12b22e4f0733f2b4b9804ac3bb8e4a5a' AND file:hashes.SHA1 = '2f6ff9751a790141c0e2e3b82f5dbc6e840594e9' AND file:hashes.SHA256 = 'f47750218afdebc37ae9462356dd5a1209a238e4228dd10001641211b91862ac']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--00d27731-8a04-43ba-944f-d93082b05bce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:40:59.000Z",
"modified": "2018-03-13T13:40:59.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f47750218afdebc37ae9462356dd5a1209a238e4228dd10001641211b91862ac/analysis/1520376493/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4eb-634c-495f-a5da-402c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4ec-ebbc-4464-9235-4cdd02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:13",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4ec-c8b0-4084-91e2-421c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a5a9364c-78a9-48e7-9960-74cafd72c762",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:03.000Z",
"modified": "2018-03-13T13:41:03.000Z",
"pattern": "[file:hashes.MD5 = 'da5bdce11de8a58d3bef93de0f066dba' AND file:hashes.SHA1 = '4b1e57aa7b60f61a898ab6aa48f79a44b9ebea6a' AND file:hashes.SHA256 = '710439f33705307e2cde051bbdf446acfad8fd94a14be5c75b8350006b3a8d6a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8812bcfd-652a-48f9-8ce0-d0859f8a7d74",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:01.000Z",
"modified": "2018-03-13T13:41:01.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/710439f33705307e2cde051bbdf446acfad8fd94a14be5c75b8350006b3a8d6a/analysis/1520488499/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4ed-bb40-4ec6-9ca9-4a7702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4ee-ac20-487c-b601-475102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:54:59",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4ee-0f5c-44bd-b5e5-49ed02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cfdebb5e-9bed-4110-91e1-967541c218d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:05.000Z",
"modified": "2018-03-13T13:41:05.000Z",
"pattern": "[file:hashes.MD5 = 'fc949f50f21a5dfeb2eb63f9b179c5cf' AND file:hashes.SHA1 = '74276cd1fec8cb5da1bd2cb6f59c9bb985aa6168' AND file:hashes.SHA256 = '04a320fac7e255e0cc08635abae96241944d9f0ecd0d57953447c7616ad9fbe8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--088a12ae-cb7c-4e19-bf34-de6c31c42421",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:04.000Z",
"modified": "2018-03-13T13:41:04.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/04a320fac7e255e0cc08635abae96241944d9f0ecd0d57953447c7616ad9fbe8/analysis/1512766103/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4f0-46a4-4d03-8373-4c8202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4f0-f890-4054-8951-42f502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-08 20:48:23",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4f0-ec18-4ef7-a116-400502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8cfdb710-e0eb-4aa0-be7f-4bef7c057f48",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:08.000Z",
"modified": "2018-03-13T13:41:08.000Z",
"pattern": "[file:hashes.MD5 = '1a292f55814ef9e1f70049df9334fb57' AND file:hashes.SHA1 = '93ce5a6a664312b6486d000077fcdebe3fbddb9a' AND file:hashes.SHA256 = 'd8f73e616842ea745a15959c217dd383dd41cd0f706035759d40e5ea1ffdacce']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--50d32b71-58f6-49bd-950c-8201f8c8f6a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:06.000Z",
"modified": "2018-03-13T13:41:06.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d8f73e616842ea745a15959c217dd383dd41cd0f706035759d40e5ea1ffdacce/analysis/1514997354/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4f2-a020-4c89-991f-4eba02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4f2-750c-41c7-bd2c-4ff202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 16:35:54",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4f2-d198-488d-8414-49cb02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0ee0151f-da7d-4d9f-8d67-74dc297b1ac7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:10.000Z",
"modified": "2018-03-13T13:41:10.000Z",
"pattern": "[file:hashes.MD5 = '7fd32b557b1b11061bce4689b0a8e437' AND file:hashes.SHA1 = 'a0cbe4f7f0feb2d9154e74c94ffa48f7ecd27899' AND file:hashes.SHA256 = '8697c6d9c186cbbab22974817f957fb41cb8b288667e7c38c6df981cb3386f5d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--afef20ad-8f41-41fd-ab24-c13d4bb81db2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:08.000Z",
"modified": "2018-03-13T13:41:08.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8697c6d9c186cbbab22974817f957fb41cb8b288667e7c38c6df981cb3386f5d/analysis/1520439664/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4f4-b30c-4555-948b-405e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4f5-14b0-4261-bdf4-42db02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:21:04",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4f5-c9b0-48ab-8022-47fb02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--66c51f09-728f-4bbc-a2f0-8fd2dd9ee34c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:12.000Z",
"modified": "2018-03-13T13:41:12.000Z",
"pattern": "[file:hashes.MD5 = 'bea76d96c3e5b8c37c9b962079e63110' AND file:hashes.SHA1 = '64a25529d4d2fc328a9b1e1baed92a008b04f55c' AND file:hashes.SHA256 = '9ad3cbe820b31d27dca4c28d56ba3654735e7d1d00b091167fb1a8d9ac0dd31c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--94c29569-4c2f-4eca-83ea-71b34b2f04ac",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:10.000Z",
"modified": "2018-03-13T13:41:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9ad3cbe820b31d27dca4c28d56ba3654735e7d1d00b091167fb1a8d9ac0dd31c/analysis/1515544166/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4f7-a37c-4ac4-93e5-455602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4f7-1294-49e5-b8c8-421302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-10 00:29:26",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4f7-a668-451e-bd18-4e8b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8ba4601c-07fc-4c31-b409-70f55daec9da",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:14.000Z",
"modified": "2018-03-13T13:41:14.000Z",
"pattern": "[file:hashes.MD5 = '7281036c082981f71602a4b4116b984a' AND file:hashes.SHA1 = 'f7a1e36729126ce981ab0e022a28c4bf8332b140' AND file:hashes.SHA256 = '85962b40ad53bbcb04bc9536bbab5244142b6239f972cfffd43d3c6f7956849c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e0e6c464-9727-4e62-99a8-d2d896ef3be0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:13.000Z",
"modified": "2018-03-13T13:41:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/85962b40ad53bbcb04bc9536bbab5244142b6239f972cfffd43d3c6f7956849c/analysis/1519220697/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4f9-d188-474f-9e06-41c502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "22/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4f9-493c-40e7-a74f-46a802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-21 13:44:57",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4f9-abb4-4f72-9d10-45bd02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c7f95bca-d452-4ca5-b2fd-81284eefa29a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:17.000Z",
"modified": "2018-03-13T13:41:17.000Z",
"pattern": "[file:hashes.MD5 = '10a9c65499b1921019f9704b9d461f5a' AND file:hashes.SHA1 = 'f6229c6a1b417d24451b86e7d40318f221d53b32' AND file:hashes.SHA256 = '901354b147cba30d916c0dc57a74fd24cfb44c20bcbe950aaff3e32856ea220e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--95bd6a8c-2c13-44dc-a176-04b903e55468",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:15.000Z",
"modified": "2018-03-13T13:41:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/901354b147cba30d916c0dc57a74fd24cfb44c20bcbe950aaff3e32856ea220e/analysis/1520910540/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4fb-1f24-448c-9cdd-48f102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4fb-e054-442d-98ba-496302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:09:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d4fb-cab8-4516-864d-475102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--895e6d73-cc04-4d7d-a74f-1c79d68cc85d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:19.000Z",
"modified": "2018-03-13T13:41:19.000Z",
"pattern": "[file:hashes.MD5 = '4679c554b4fe83ded9305a4774a177de' AND file:hashes.SHA1 = 'ab45a3be4eea07f956755716d70578e607fc47e0' AND file:hashes.SHA256 = '92bf654e3cc50af479468180a3ee520bc13f979c9e50b18886cabcea09b1220e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ba96f218-b01d-4fb3-986e-4a4b129d501a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:17.000Z",
"modified": "2018-03-13T13:41:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/92bf654e3cc50af479468180a3ee520bc13f979c9e50b18886cabcea09b1220e/analysis/1520376530/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d4fd-a4a0-4648-a06e-48a502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4fe-fa3c-4866-92f6-41c702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:50",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d4fe-adbc-48b5-bff5-4cf202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a18a3d72-f1c0-40f0-9281-25c93d8002c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:21.000Z",
"modified": "2018-03-13T13:41:21.000Z",
"pattern": "[file:hashes.MD5 = '11cdffa4a67149553f9b77956a10e2a5' AND file:hashes.SHA1 = '9ee8dd0f64c5586cc23848823b2638fb2d6a4170' AND file:hashes.SHA256 = '18de35862022570015788dac8f5f60d47bbdf7922e5b75da278828eac1d9cafb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d673e058-bd6f-4588-b64a-5f26648b833f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:19.000Z",
"modified": "2018-03-13T13:41:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/18de35862022570015788dac8f5f60d47bbdf7922e5b75da278828eac1d9cafb/analysis/1520437577/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d4ff-c3b0-416c-b8a7-43a202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d500-7598-4b23-9ce7-44ef02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:46:17",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d500-85f4-42ea-907e-46c802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1a981d65-59bc-4a14-81a1-008f4c77159a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:23.000Z",
"modified": "2018-03-13T13:41:23.000Z",
"pattern": "[file:hashes.MD5 = '36027b6b489adcbbd12dc845f193cf37' AND file:hashes.SHA1 = '342d96b456046c71cf7371d64bc8c07d77edacf1' AND file:hashes.SHA256 = 'd10f6ae7735ec1767efb756a14aa8f45d3d0b926787eb6e682ae85a4f2e5f5af']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ad7412ca-ba99-4dc1-9098-1b14d7898562",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:22.000Z",
"modified": "2018-03-13T13:41:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d10f6ae7735ec1767efb756a14aa8f45d3d0b926787eb6e682ae85a4f2e5f5af/analysis/1519360656/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d502-9308-42bb-9946-42a602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d502-e190-4497-959c-404902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-23 04:37:36",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d503-f8f4-4360-8576-46b702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f6601087-35c3-4239-85b2-25f4a4c9c1f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:26.000Z",
"modified": "2018-03-13T13:41:26.000Z",
"pattern": "[file:hashes.MD5 = '5f71d4dd75b0495a8457d8a70c33fa28' AND file:hashes.SHA1 = '2be2d3f434748a5679cb9b4dcbd107c7a3645193' AND file:hashes.SHA256 = '2811f5cd04ee2907fb8d00e88a40dd32d95fb2c8223ed490d578c44cda923608']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f1915336-fa1d-4500-931f-5368fbc727d4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:24.000Z",
"modified": "2018-03-13T13:41:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/2811f5cd04ee2907fb8d00e88a40dd32d95fb2c8223ed490d578c44cda923608/analysis/1515001559/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d504-1350-4368-ba47-4adb02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d505-6724-4ebe-a8a9-410302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 17:45:59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d505-2ffc-4ba6-b300-4e2602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--abf60cec-d36a-4744-b7a1-a33e5763a9c4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:28.000Z",
"modified": "2018-03-13T13:41:28.000Z",
"pattern": "[file:hashes.MD5 = 'bfa58f9ec10a546b96494acd73424806' AND file:hashes.SHA1 = 'dab5b0613e223be2c1379f23bd0d2f17786bbb93' AND file:hashes.SHA256 = 'b06eb80d956774cb2ef9a38ee6c2a5af34729f575c80ba6af4bf6e501497fc0c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--32ea0688-10d4-4123-b4c6-d68fb5cc55d4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:26.000Z",
"modified": "2018-03-13T13:41:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b06eb80d956774cb2ef9a38ee6c2a5af34729f575c80ba6af4bf6e501497fc0c/analysis/1517591897/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d506-d368-4398-9c03-4cd202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d507-7784-4306-90c5-4bcd02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-02 17:18:17",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d507-13e0-442e-aad0-4a1802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a8aecb74-f7d5-4f56-9dc7-3c00ba2f4b0d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:30.000Z",
"modified": "2018-03-13T13:41:30.000Z",
"pattern": "[file:hashes.MD5 = '756207a2669097ba1376a11030aeb0ef' AND file:hashes.SHA1 = 'e85d475bad6b36cea50b1e25a6cb26a5a0cbef9d' AND file:hashes.SHA256 = 'cf35ce413d812c79d61fb6e30aacb203ab23c253d7cbef28941f92923aaf6aea']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f355561d-a7fa-4896-be8c-1f8274815354",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:29.000Z",
"modified": "2018-03-13T13:41:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cf35ce413d812c79d61fb6e30aacb203ab23c253d7cbef28941f92923aaf6aea/analysis/1520908620/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d509-db80-4ed0-b708-4b1802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/64",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d509-d344-43da-9b77-4ec302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 02:37:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d509-6628-42d9-b769-446502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a9d8f073-dd7a-4e9b-a0a7-04598ce32926",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:33.000Z",
"modified": "2018-03-13T13:41:33.000Z",
"pattern": "[file:hashes.MD5 = '4c55d5d3acf1ae94b10c7d9f5d1e3937' AND file:hashes.SHA1 = 'ef9b0590f4ed5c8e80daf5840b22d5cc44fa6cf7' AND file:hashes.SHA256 = '30459539ca6f322c7f8a395092211df50361e834c5da0e3734c62eacf69afaad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--10380065-18d9-4ca8-8cb4-dad38fdd929d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:31.000Z",
"modified": "2018-03-13T13:41:31.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/30459539ca6f322c7f8a395092211df50361e834c5da0e3734c62eacf69afaad/analysis/1520376510/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d50b-a920-4f4a-bf47-441602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d50b-6514-4be4-9488-43f402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:30",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d50b-940c-44e1-943b-431002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7638c728-3089-4a20-af0a-b37900bc1f1d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:35.000Z",
"modified": "2018-03-13T13:41:35.000Z",
"pattern": "[file:hashes.MD5 = '5e2368598233ac6c6e89f16c75d44165' AND file:hashes.SHA1 = 'efa3de8d9ef8e4aeddcf7fe93b71cfa5add5789f' AND file:hashes.SHA256 = '9884d3287d3be69a0d06c6fd414d828b0036106580f212e39b6adbbddace2010']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--86f66db8-becb-45ae-b0f3-e3340cd5d19a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:33.000Z",
"modified": "2018-03-13T13:41:33.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9884d3287d3be69a0d06c6fd414d828b0036106580f212e39b6adbbddace2010/analysis/1516389123/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d50d-30f8-494d-ac70-4aa002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d50e-e430-473c-b043-46e202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-19 19:12:03",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d50e-7854-4e75-a0f9-4d6802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7f886d78-e6f7-4ecd-8828-e9693e314aa0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:37.000Z",
"modified": "2018-03-13T13:41:37.000Z",
"pattern": "[file:hashes.MD5 = '0376e3c69f05249b29111058b5486701' AND file:hashes.SHA1 = 'fce3c8c9a807c40a67804f0c26d6e4b1fb97e710' AND file:hashes.SHA256 = '4e6f7d50b2c4616421f4e662eec927b9f60dbf720f0e3dea25d9177c56f329e4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0f3c8eab-f129-49da-9ed7-cc8b7f1b09f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:35.000Z",
"modified": "2018-03-13T13:41:35.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4e6f7d50b2c4616421f4e662eec927b9f60dbf720f0e3dea25d9177c56f329e4/analysis/1520376436/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d50f-3bac-41be-a39f-4e7a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d510-7ec4-413b-9156-4c4d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:16",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d510-8a48-438f-8128-4e9402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--51f66ea4-bd23-495b-be2c-64962e187550",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:39.000Z",
"modified": "2018-03-13T13:41:39.000Z",
"pattern": "[file:hashes.MD5 = '34c66359ea5ae2861b7d253e76478ce2' AND file:hashes.SHA1 = '20212f5365f5ab17adcaeaa6c70512a86014340f' AND file:hashes.SHA256 = 'b6b715982d7674f28e697ab896840d8dc596324351ab5aa21336c597d72d7500']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ff35fc80-aed9-44b8-bf9a-04ae04bb9b29",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:38.000Z",
"modified": "2018-03-13T13:41:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b6b715982d7674f28e697ab896840d8dc596324351ab5aa21336c597d72d7500/analysis/1508426040/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d512-6de8-4130-b11c-4cfc02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/65",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d513-8a40-46d9-9ad7-470202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-10-19 15:14:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d513-811c-4c13-a4e4-457e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--93cdfd6c-153f-458f-8b4d-6d3eea4d85fa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:42.000Z",
"modified": "2018-03-13T13:41:42.000Z",
"pattern": "[file:hashes.MD5 = 'ea5b8f05a9424599fbc31a53ec17fa9c' AND file:hashes.SHA1 = 'c12097a85c7c29cdeeb6ee29580cb879f3e94f33' AND file:hashes.SHA256 = '10e90d6fce4d5cf1c3f4a9e779547570986c948a7ed2d6cc824c279f73d0589a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--25d08574-096e-4a9b-b9cc-e292aff3160a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:41.000Z",
"modified": "2018-03-13T13:41:41.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/10e90d6fce4d5cf1c3f4a9e779547570986c948a7ed2d6cc824c279f73d0589a/analysis/1514997386/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d515-8f50-4376-81b8-43ff02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "38/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d515-1380-417a-a6c0-405402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 16:36:26",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d515-d238-4119-a715-419a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d2244ec7-b833-45ee-b46d-46d0eb8821a6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:44.000Z",
"modified": "2018-03-13T13:41:44.000Z",
"pattern": "[file:hashes.MD5 = '949cd3e4eb1d8bd59962e83bb44160c7' AND file:hashes.SHA1 = '2a021f8625281add451f212cef427a2a00d34ef3' AND file:hashes.SHA256 = '514f5bf6c530f0baa7697e52dfc22c2199c378765d461c573b26ab9b0cfa71a1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0dd974d2-228a-4efd-9c80-5c3ebec6afe2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:43.000Z",
"modified": "2018-03-13T13:41:43.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/514f5bf6c530f0baa7697e52dfc22c2199c378765d461c573b26ab9b0cfa71a1/analysis/1520438593/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d517-5924-4d38-9537-49b102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d517-da28-4c66-9470-4f3b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:03:13",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d517-82c4-41d2-ab65-498402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a252e7e6-4210-4a0e-af70-808685490bf0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:47.000Z",
"modified": "2018-03-13T13:41:47.000Z",
"pattern": "[file:hashes.MD5 = '0cacb65ec9da1de3c40dc0415e3ebc12' AND file:hashes.SHA1 = '0d2002f4b7132a675ed7513d8a076a621539b466' AND file:hashes.SHA256 = 'cfd3c017a7e9a7a1a1e47a60bdbfde167899caae9da81e5854994a851d9927f4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3fda77bd-6a6a-4fdb-a784-0569bd5b8bc4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:45.000Z",
"modified": "2018-03-13T13:41:45.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cfd3c017a7e9a7a1a1e47a60bdbfde167899caae9da81e5854994a851d9927f4/analysis/1514997396/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d519-f430-48c7-b8ea-449c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d519-f21c-4d3d-8874-415102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 16:36:36",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d519-45b8-4691-957b-4caf02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--652791f2-58a3-4bc2-9127-eee90e5777fc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:49.000Z",
"modified": "2018-03-13T13:41:49.000Z",
"pattern": "[file:hashes.MD5 = '4a1eb3343df894ef4d6c4d63362896ca' AND file:hashes.SHA1 = 'f7fa8cc65e936f5a7d7f62a9b4eeb35d964eaf3e' AND file:hashes.SHA256 = '9032651ccf32fa0acad949d32bacd2220582ac13c364033641413457dbb3b3b9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--245b7bed-15e3-4235-86bd-27e0d9bc6c46",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:47.000Z",
"modified": "2018-03-13T13:41:47.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9032651ccf32fa0acad949d32bacd2220582ac13c364033641413457dbb3b3b9/analysis/1520376456/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d51b-ccfc-4493-9a48-4f8b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d51c-a124-4765-a0b0-4faf02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:36",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d51c-3b84-4202-97e6-41dc02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd4872e3-93f3-4a82-85ab-0fef4dc1a473",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:51.000Z",
"modified": "2018-03-13T13:41:51.000Z",
"pattern": "[file:hashes.MD5 = 'f2ddf0aed177868e071afcfcaf56e5a5' AND file:hashes.SHA1 = 'e66598e701d212e3f6b09f7fbcba1fd0d5d9d34f' AND file:hashes.SHA256 = '623d2a5e4bc341c96d7b1dbeaa448fe54616d1f2d62c51e46df3d066308fb904']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--47225078-5904-4fc7-96ae-03e630f628e7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:49.000Z",
"modified": "2018-03-13T13:41:49.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/623d2a5e4bc341c96d7b1dbeaa448fe54616d1f2d62c51e46df3d066308fb904/analysis/1520438920/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d51d-ad6c-4491-b41c-4e0a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d51e-30f4-4dcd-bfa0-41a102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:08:40",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d51e-b9b0-4f97-a9cc-4dc502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7724b584-9fbf-4690-8824-571ca40e8647",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:53.000Z",
"modified": "2018-03-13T13:41:53.000Z",
"pattern": "[file:hashes.MD5 = 'e518dd168c1c27f81b6125a6d46334b7' AND file:hashes.SHA1 = 'f8e918d282668119c18ad0efacc0ee00bd558998' AND file:hashes.SHA256 = '8af4c02a21385918fbab32079e38bd955dbfd9a3b5cd409668830053a14b07dc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a9700a79-b809-4626-9a0f-1b5e30547578",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:51.000Z",
"modified": "2018-03-13T13:41:51.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8af4c02a21385918fbab32079e38bd955dbfd9a3b5cd409668830053a14b07dc/analysis/1518472089/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d520-2bd4-4386-828b-43e202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d520-b14c-4c86-a53f-455902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-12 21:48:09",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d520-a960-4e20-82aa-4e2002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--eccc55d5-a165-4f16-8dba-993df6d0c16d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:55.000Z",
"modified": "2018-03-13T13:41:55.000Z",
"pattern": "[file:hashes.MD5 = '13c4f15612d2f0139057223c203b8db1' AND file:hashes.SHA1 = '20caa4eec283accdd8e386bb80267542fd304ce6' AND file:hashes.SHA256 = '05e4dfeb72eb015cacc9f1040d205d7f5205a6d4d29eed5f1221ed1ef0a8061e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c14e1628-941c-43c0-81ef-0b8bf8e8db3e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:55.000Z",
"modified": "2018-03-13T13:41:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/05e4dfeb72eb015cacc9f1040d205d7f5205a6d4d29eed5f1221ed1ef0a8061e/analysis/1520586463/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d523-34a8-4c14-a98c-423a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d523-3d18-4069-841b-4dc902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-09 09:07:43",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d524-6e00-4fb6-b1a5-4b8202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--da83d80a-c5b2-4f00-b78f-bd6cea6c47be",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:59.000Z",
"modified": "2018-03-13T13:41:59.000Z",
"pattern": "[file:hashes.MD5 = '2f50fd400814cd44be23c8db21ceecc1' AND file:hashes.SHA1 = 'cb1b5ebb4263f6334819b29eb0cc47694d49467c' AND file:hashes.SHA256 = 'ad0f1d6393747a394353e830b3d0c89dd3cd8c4a8c1bab1064451cae5a4a1b36']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:41:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e7be8927-c465-4b2e-bfcc-68a41eae297a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:41:57.000Z",
"modified": "2018-03-13T13:41:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ad0f1d6393747a394353e830b3d0c89dd3cd8c4a8c1bab1064451cae5a4a1b36/analysis/1520851920/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d525-6c7c-4be6-8cb1-436602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d526-ce2c-40e9-a8a7-43d602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 10:52:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d526-e95c-4041-a213-49cb02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--de30c258-e3ff-4103-90f0-66b263006c0b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:01.000Z",
"modified": "2018-03-13T13:42:01.000Z",
"pattern": "[file:hashes.MD5 = '0d32128c5b6ae94200a79e41384ad7f3' AND file:hashes.SHA1 = '24fc1f5a56fd9542ec8fb63c8c69c76f53b0ecee' AND file:hashes.SHA256 = '423d6adbb47ce64e47944fe07bd22fd1a06e2332f5975b0da329394dcd7a5d3a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c9f224ab-0c81-4deb-9160-85f96bc624c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:00.000Z",
"modified": "2018-03-13T13:42:00.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/423d6adbb47ce64e47944fe07bd22fd1a06e2332f5975b0da329394dcd7a5d3a/analysis/1520912415/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d528-f5a8-42b6-8a21-4f5002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "39/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d529-8fa4-4c9d-a163-440002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:40:15",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d529-2a58-4d9f-afe6-4bae02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e4f6dfdc-fb92-4812-8c6d-91b7548ebadf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:04.000Z",
"modified": "2018-03-13T13:42:04.000Z",
"pattern": "[file:hashes.MD5 = '08605790892ea70f4c39e41f73456834' AND file:hashes.SHA1 = '53ed4fd89a4a185166f4d661ee82fbb22accf76a' AND file:hashes.SHA256 = '32636046a3a6d97791d0a48ac59dca6c1ee3a030bdc33610c2bef1c726487b9a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f83784d1-6a08-4009-a46e-4aed15ff5dee",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:02.000Z",
"modified": "2018-03-13T13:42:02.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/32636046a3a6d97791d0a48ac59dca6c1ee3a030bdc33610c2bef1c726487b9a/analysis/1515002932/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d52a-e850-4bf0-b7fa-449d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d52b-2928-4b2f-a973-47a402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 18:08:52",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d52b-b824-4f69-92c0-457502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5a0cdfe2-1650-41fa-ac1f-99afa14cc188",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:06.000Z",
"modified": "2018-03-13T13:42:06.000Z",
"pattern": "[file:hashes.MD5 = 'ad0ccd17c1700e23912cfc78d319c597' AND file:hashes.SHA1 = '59e1cda361cbe7548c3c9e49d6eecdd8d50abc74' AND file:hashes.SHA256 = '5328e6cc453209eea9a2dc41e0ef19516794a5cebf90c6094acc581b8fbfe966']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b3785c90-1c5f-4739-8cf1-31e946583359",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:05.000Z",
"modified": "2018-03-13T13:42:05.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5328e6cc453209eea9a2dc41e0ef19516794a5cebf90c6094acc581b8fbfe966/analysis/1520913600/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d52d-2eec-4877-9123-41b302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d52d-cbd8-475c-9e61-409602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 04:00:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d52d-de34-4e52-8367-49c102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--da10673d-4b03-473f-943b-e68b51a49372",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:09.000Z",
"modified": "2018-03-13T13:42:09.000Z",
"pattern": "[file:hashes.MD5 = '322a5da5f793a3c364a6e32e8e835975' AND file:hashes.SHA1 = '4a4829655711fbcc2d127fef98cb2c944e66933c' AND file:hashes.SHA256 = '04b7d38fa77396c75adfbb91e7efc725e97bbe673f575b42862031c1039dbdd2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c0f2a053-934c-4be9-ad1d-7249dfef9301",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:07.000Z",
"modified": "2018-03-13T13:42:07.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/04b7d38fa77396c75adfbb91e7efc725e97bbe673f575b42862031c1039dbdd2/analysis/1518511561/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d52f-39ac-4d10-9435-4ed902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d530-66dc-498f-876e-478702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-13 08:46:01",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d530-b9fc-4049-aba8-481702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb0ffcf7-6e1a-4bc5-b72e-b1c50a4c072a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:11.000Z",
"modified": "2018-03-13T13:42:11.000Z",
"pattern": "[file:hashes.MD5 = 'e500296c9f1d393f12f50a2728e17cd2' AND file:hashes.SHA1 = 'b7cbf3071bc9495a1c6d1bb088520aa197dd5aec' AND file:hashes.SHA256 = '510d7394bf01f4c836524d08cf7f35bdf15f304e4b7b8287d8759316b275e396']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c0d442d4-72b6-47cb-b4b8-18744a4fd84d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:10.000Z",
"modified": "2018-03-13T13:42:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/510d7394bf01f4c836524d08cf7f35bdf15f304e4b7b8287d8759316b275e396/analysis/1517544512/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d532-70f4-43ca-b354-473a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d532-898c-4390-9ee7-455f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-02 04:08:32",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d532-bc5c-4b1c-b247-44ad02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4272cdd1-73f2-4b9a-a8b5-64d3a1d7dfd0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:13.000Z",
"modified": "2018-03-13T13:42:13.000Z",
"pattern": "[file:hashes.MD5 = '1a453d07485b6cb2c889d2676d4cf67e' AND file:hashes.SHA1 = 'bad636002e12d41fcc6e0f5ca38a5b8879d3d412' AND file:hashes.SHA256 = 'dee5e465fc4959e019cc6e781d4be278997c34a0465fa36825339e12068119c5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--857ca1d6-7992-4e86-9a8a-9baf9005bbd9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:12.000Z",
"modified": "2018-03-13T13:42:12.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/dee5e465fc4959e019cc6e781d4be278997c34a0465fa36825339e12068119c5/analysis/1513345277/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d534-5f04-4cd9-8608-4ec802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d534-7770-4dfc-a1c9-4ea702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-15 13:41:17",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d534-5890-4c2d-ba8c-404202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2f2d7190-59a8-4a22-b2af-ac312b91bfe0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:16.000Z",
"modified": "2018-03-13T13:42:16.000Z",
"pattern": "[file:hashes.MD5 = 'b6396acf9a09c594e9ab140d82f3d049' AND file:hashes.SHA1 = '5e03582d68dc08d555cc787e289f64831712a6b6' AND file:hashes.SHA256 = 'ed43f1d983feb172fcf4b62956428ab6b4410a4cddbc6f02657f00dce2fc3a1c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--df56eb90-6fe6-4dc2-86c7-0c1134d65812",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:14.000Z",
"modified": "2018-03-13T13:42:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ed43f1d983feb172fcf4b62956428ab6b4410a4cddbc6f02657f00dce2fc3a1c/analysis/1520441130/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d536-e9a4-4de0-84b4-430a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "27/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d537-9924-4f3c-9025-4a1802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:45:30",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d537-25c8-43c9-a896-4a7002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2701b8c8-6625-4f06-a88f-c78f56165a61",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:18.000Z",
"modified": "2018-03-13T13:42:18.000Z",
"pattern": "[file:hashes.MD5 = '8e5735a3d15f3b2105095316288280d8' AND file:hashes.SHA1 = '42c52061934623a051e4213e1f2a04fd2957e9fa' AND file:hashes.SHA256 = '210397548a6178ea29fc4567328524b41592cfd60fe1a3db543ef49eb37f0a7d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9f4f8732-0f86-487d-b2f5-1d2d89aef0bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:16.000Z",
"modified": "2018-03-13T13:42:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/210397548a6178ea29fc4567328524b41592cfd60fe1a3db543ef49eb37f0a7d/analysis/1520873280/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d539-fcc4-41e5-8ebc-49a702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d539-2c48-4667-9486-4aee02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 16:48:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d539-3718-4fa7-a00f-40f402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--93b95f15-4cb7-419f-841c-450ac3d2fcf6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:20.000Z",
"modified": "2018-03-13T13:42:20.000Z",
"pattern": "[file:hashes.MD5 = '4c13ba00fef1d3fa4e94661d2c830c17' AND file:hashes.SHA1 = '0f741307b29f86202ff8f3bc819e24bfe40f20df' AND file:hashes.SHA256 = '620cf704d9930328729fd66be9c83f6db33088199a60a02315110bd757c13ef7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--048e1c5f-6a94-4dd9-bbf7-eda1802b6d9c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:19.000Z",
"modified": "2018-03-13T13:42:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/620cf704d9930328729fd66be9c83f6db33088199a60a02315110bd757c13ef7/analysis/1518195991/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d53b-be3c-44cd-ba89-446402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d53b-a90c-4f4a-84ab-476b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-09 17:06:31",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d53b-c52c-4c36-999b-40ad02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--be1441ae-b2e5-41ed-abdd-414809f6352f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:23.000Z",
"modified": "2018-03-13T13:42:23.000Z",
"pattern": "[file:hashes.MD5 = '3df2138116d2fedafb91816cd7167012' AND file:hashes.SHA1 = 'd938099905038f767c2492672f489e5e66b8c39c' AND file:hashes.SHA256 = '904285c01b8b7fda39b5ffdad48101a2fb3c2ea82bc47d480383bf11ce926c7c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3741aec9-519d-4649-ad8a-549d2450e256",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:21.000Z",
"modified": "2018-03-13T13:42:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/904285c01b8b7fda39b5ffdad48101a2fb3c2ea82bc47d480383bf11ce926c7c/analysis/1520913593/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d53d-dae8-452c-9331-42a602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d53e-f608-47e8-9c7f-402402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:59:53",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d53e-eb10-46cf-b8fe-4ba302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f231a6ea-f8b4-43f8-adac-96e31854da2c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:25.000Z",
"modified": "2018-03-13T13:42:25.000Z",
"pattern": "[file:hashes.MD5 = '52c2197dbaff94934786b3fc6c22f1f7' AND file:hashes.SHA1 = 'd75579b47a545919affc7de96a50ff6a1e81a1b2' AND file:hashes.SHA256 = '644bab0b1aee8016d3c11a5112b80f7d9522203bbfb9b04218a13c95920aa185']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e5f7cc1c-cd7e-49f5-9d23-96945164180e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:23.000Z",
"modified": "2018-03-13T13:42:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/644bab0b1aee8016d3c11a5112b80f7d9522203bbfb9b04218a13c95920aa185/analysis/1520904120/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d540-ff24-45e7-b675-4cef02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d540-8208-4582-aa5c-414502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 01:22:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d540-12bc-4ad9-bde8-4c3a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f9a65653-53de-44fd-a416-29aeb4cf5f1e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:28.000Z",
"modified": "2018-03-13T13:42:28.000Z",
"pattern": "[file:hashes.MD5 = '1a75be6c77ffedd2cde402495ddbe668' AND file:hashes.SHA1 = 'b8a3f39c3f8e61b4ea3de7973b749ff470da162c' AND file:hashes.SHA256 = 'b4898ad9f1757bd6f127fd9a539f393004654608037ba94b3a62a81166fd1163']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--19789499-f9e3-4415-afb9-7dee60e37880",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:26.000Z",
"modified": "2018-03-13T13:42:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b4898ad9f1757bd6f127fd9a539f393004654608037ba94b3a62a81166fd1163/analysis/1515017524/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d542-5c08-4349-804c-4ecf02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d542-6730-414d-bcfb-480902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 22:12:04",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d542-9bbc-4622-9607-453202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--091a7f76-14d6-48df-86fc-76bf406a81a9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:30.000Z",
"modified": "2018-03-13T13:42:30.000Z",
"pattern": "[file:hashes.MD5 = '4fd9ccd0bd6e296a356d5e4ed06eec4f' AND file:hashes.SHA1 = '133af28ead4b2ef10f05f4cf8aaedb819a0b1bc1' AND file:hashes.SHA256 = 'fee25e7d024107c867f4ddbb61756bb02e935a8802813f5d8677b3ecc282759d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fc99724e-fb1c-49c1-a876-021d95449e91",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:28.000Z",
"modified": "2018-03-13T13:42:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/fee25e7d024107c867f4ddbb61756bb02e935a8802813f5d8677b3ecc282759d/analysis/1520929147/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d544-a3f8-4662-a5cb-4d0202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "23/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d544-aa18-4d8c-a348-450302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 08:19:07",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d544-1374-4f30-9247-431d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--edc558da-e5d9-484e-a89c-2d4286e33de7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:32.000Z",
"modified": "2018-03-13T13:42:32.000Z",
"pattern": "[file:hashes.MD5 = '3961de98d1abbea525fbce184b538624' AND file:hashes.SHA1 = '38d8d3a9be1128e3f2e6656ba011713d4ae92526' AND file:hashes.SHA256 = 'f8af90b820a1e6b052ce62d9f8446457f74a4542c6d6f6eec354b895982502b1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a567af95-f7a3-4bf2-baa3-270f681e5322",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:30.000Z",
"modified": "2018-03-13T13:42:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f8af90b820a1e6b052ce62d9f8446457f74a4542c6d6f6eec354b895982502b1/analysis/1520586165/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d546-1a80-4cc8-9b2c-405502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "27/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d547-abf8-4e43-8181-449002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-09 09:02:45",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d547-f040-42fc-a75c-41b602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad876176-ecb0-4443-a1e3-3474fea95c7c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:34.000Z",
"modified": "2018-03-13T13:42:34.000Z",
"pattern": "[file:hashes.MD5 = 'd5dd018912ab9082c5589de04bac629f' AND file:hashes.SHA1 = '4a4afbe594e40e5bede5a23d633807310e150c31' AND file:hashes.SHA256 = 'e1b34078b5aab799cb78e7103286817a740da430fd1f107bfd4a673dce8fa9fc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4c0aa304-4439-4634-ab20-fa7a819e4cfb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:32.000Z",
"modified": "2018-03-13T13:42:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e1b34078b5aab799cb78e7103286817a740da430fd1f107bfd4a673dce8fa9fc/analysis/1519360597/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d548-bdb4-4f97-a401-4f7602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d549-5690-4047-9c5c-476502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-23 04:36:37",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d549-d288-4aab-9137-472b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--27853edd-8b95-4a9c-8fd5-256adb3e5da6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:36.000Z",
"modified": "2018-03-13T13:42:36.000Z",
"pattern": "[file:hashes.MD5 = '00cf83ee91654990c031ce1b1de05435' AND file:hashes.SHA1 = '696ae9e32c7cc085d62336d910abe45111280f66' AND file:hashes.SHA256 = 'baf4586c1fcdc32fa2ac1441df17591aa34f54d842ad596abd2cadfc190f02e9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4a39f8b7-6642-4a32-aa2c-511de3de0ae6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:35.000Z",
"modified": "2018-03-13T13:42:35.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/baf4586c1fcdc32fa2ac1441df17591aa34f54d842ad596abd2cadfc190f02e9/analysis/1520440814/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d54b-947c-4df4-a543-4a6202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d54b-791c-4e09-a367-450e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:40:14",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d54b-bbe0-40a4-9e81-48d202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--63998fb4-3796-4b69-bbb5-c786f85c6e24",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:39.000Z",
"modified": "2018-03-13T13:42:39.000Z",
"pattern": "[file:hashes.MD5 = '7212a4d269f3ba4e9e069d52c60a2285' AND file:hashes.SHA1 = '458735e06ded3057cb1df5a05074065c1fbdc64f' AND file:hashes.SHA256 = '41f8b418bd12776cd5bd154226d2646bb766bf3cfa95b41d03003386ada51789']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--77335a35-58f3-4736-8e65-9d43eadd3255",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:37.000Z",
"modified": "2018-03-13T13:42:37.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/41f8b418bd12776cd5bd154226d2646bb766bf3cfa95b41d03003386ada51789/analysis/1520438275/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d54d-b458-4394-bbaa-45b102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d54d-619c-4d23-97dc-4a5202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:57:55",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d54d-3f70-42c6-8e48-473102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f501ee7d-5468-4059-a745-dc1f392e6a44",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:41.000Z",
"modified": "2018-03-13T13:42:41.000Z",
"pattern": "[file:hashes.MD5 = '0bec6bc954b25143f321d42b7dc8ab7a' AND file:hashes.SHA1 = 'f5ad792f0b7c0e4235c7671c381cbb97bfe81932' AND file:hashes.SHA256 = 'f010103d51638b98c985abdab4fe9deaeb850bf924f93b53c9084da8ce927f5b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8482a386-b5b8-479a-974a-219fe749b1ab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:39.000Z",
"modified": "2018-03-13T13:42:39.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f010103d51638b98c985abdab4fe9deaeb850bf924f93b53c9084da8ce927f5b/analysis/1517469178/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d54f-3738-4407-800c-4e2502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d550-be4c-425d-8d75-49f202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-01 07:12:58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d550-7b3c-45a9-814e-4ae102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ebfa55c6-2e68-4f35-a2f3-060799e22095",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:43.000Z",
"modified": "2018-03-13T13:42:43.000Z",
"pattern": "[file:hashes.MD5 = 'f18c88198ce4f026bbd160c998151ea0' AND file:hashes.SHA1 = 'fd61fa76d4f22f617a51efc966704e96cc660e93' AND file:hashes.SHA256 = '5cab554b4aa4864cce93e6853142cd361866fe37bb55e13711163ebee9286662']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a3bb6a50-5123-498e-8f1a-6923b54b0b35",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:42.000Z",
"modified": "2018-03-13T13:42:42.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5cab554b4aa4864cce93e6853142cd361866fe37bb55e13711163ebee9286662/analysis/1520438781/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d552-3470-4a5e-91c3-4acd02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d552-ce08-450f-a329-4eea02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:06:21",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d552-5c3c-4de7-af63-42ec02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2316025b-81d4-4611-8420-62597b2163f7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:46.000Z",
"modified": "2018-03-13T13:42:46.000Z",
"pattern": "[file:hashes.MD5 = 'ddf6d305bbab8b6394c98f4b340a59f7' AND file:hashes.SHA1 = '6eb9e9d79018b32edcd2cbfef9db7d31e59d543b' AND file:hashes.SHA256 = 'c26dbbb1c5ee2c35561eebdd89f03be9e200da66ba31f63c1c074300c9277764']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--436f3cd9-f66e-4d35-b0c3-ba8c39c5a0c4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:44.000Z",
"modified": "2018-03-13T13:42:44.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/c26dbbb1c5ee2c35561eebdd89f03be9e200da66ba31f63c1c074300c9277764/analysis/1518959606/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d554-db40-4d65-8b7f-470d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "39/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d554-df04-454a-8979-4ab902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-18 13:13:26",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d554-a640-46ce-9469-43d502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dc57f819-a4ca-4824-ba9d-e6d0e9f78b9d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:48.000Z",
"modified": "2018-03-13T13:42:48.000Z",
"pattern": "[file:hashes.MD5 = '35e9067e608aa8fc816869c022c520be' AND file:hashes.SHA1 = '1945aa2c167f3348af207b024a16f0bb7937ec62' AND file:hashes.SHA256 = 'abacd28fa6ac67ecb85aa15ac26d48fc60c5d0f8a0301f0d1ea4421c69685c3b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--37f56d93-b168-44cb-90c9-e245c6eee85a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:46.000Z",
"modified": "2018-03-13T13:42:46.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/abacd28fa6ac67ecb85aa15ac26d48fc60c5d0f8a0301f0d1ea4421c69685c3b/analysis/1520376537/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d556-6014-40c9-a659-4b3802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d556-9b04-4e0b-a43c-45a402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:57",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d556-3040-42ec-b3bc-477a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4f1fd255-9d15-43ec-a8b6-5fdf0abbd1c5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:50.000Z",
"modified": "2018-03-13T13:42:50.000Z",
"pattern": "[file:hashes.MD5 = '5b388ad24d07f6e7833806fe98f8c737' AND file:hashes.SHA1 = 'e47f79c321bc072df3fb2e1fc3d78c57098abacd' AND file:hashes.SHA256 = '8599d1ce8abd86248f214f44a87cccf8e428c59451db3f8f09606c3d15d99d74']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--18efd0c2-3813-4e9f-bf69-330dea779353",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:48.000Z",
"modified": "2018-03-13T13:42:48.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8599d1ce8abd86248f214f44a87cccf8e428c59451db3f8f09606c3d15d99d74/analysis/1520439638/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d558-0e10-469d-ba38-47d302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d558-eee0-438f-82cc-447702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:20:38",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d558-bcd0-4fc6-87ba-447802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8f789d00-5c20-45f6-8091-834ea7f79fcd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:52.000Z",
"modified": "2018-03-13T13:42:52.000Z",
"pattern": "[file:hashes.MD5 = '8e4619753a07b460587ddb8dcc1726da' AND file:hashes.SHA1 = 'e65b2c3c7944bed2ffe96cd6a15e6ff2f5de2b50' AND file:hashes.SHA256 = '02adb1fdee7b1306e2ba7a07a052b6d390d8e939c807b7b6515589312d072e79']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--74d6bbc6-5b6e-485e-b40f-e0076046c307",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:50.000Z",
"modified": "2018-03-13T13:42:50.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/02adb1fdee7b1306e2ba7a07a052b6d390d8e939c807b7b6515589312d072e79/analysis/1520839028/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d55a-d9a4-4730-8656-428802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d55b-8af8-42b6-bf3b-40af02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 07:17:08",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d55b-30c4-4be4-bbcd-489502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--318e9442-266a-42df-9bcb-57af40dc6fee",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:54.000Z",
"modified": "2018-03-13T13:42:54.000Z",
"pattern": "[file:hashes.MD5 = 'a190d9f1f987ec7e7845d8bbb766b45d' AND file:hashes.SHA1 = 'b1e303d44b81ebdb4efd6e25438a9ae753d0a0b7' AND file:hashes.SHA256 = 'f0b78cf8d5df4c9873ecd7750eb6b49d565097ca59e8592b07a2e748fda1ab2d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9f4cb389-a3be-4918-8887-595689e68ba0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:53.000Z",
"modified": "2018-03-13T13:42:53.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f0b78cf8d5df4c9873ecd7750eb6b49d565097ca59e8592b07a2e748fda1ab2d/analysis/1520441183/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d55d-099c-4784-8bf4-440c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d55d-e4a4-42fd-96f3-4fc402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:46:23",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d55d-78a8-4c8b-98c1-4c0202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6212c88a-a171-457e-bce5-e495cb75bcd6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:57.000Z",
"modified": "2018-03-13T13:42:57.000Z",
"pattern": "[file:hashes.MD5 = '109342c136665d62be40eab87fe88340' AND file:hashes.SHA1 = '3d811b2435c20fe6e6754c536a705c27a968e668' AND file:hashes.SHA256 = 'f9ca935d9f3a6aac48de55486eb8ca62f003baf50ced255305048464d9fd0016']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8d1e8e66-f43c-4d3f-8b88-326769b2dadd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:55.000Z",
"modified": "2018-03-13T13:42:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f9ca935d9f3a6aac48de55486eb8ca62f003baf50ced255305048464d9fd0016/analysis/1520441503/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d55f-333c-4ffd-86a4-422c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d55f-1b78-44d3-8d9f-48d602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:51:43",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d560-11b4-4787-9a14-472502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b564d217-c2db-44d8-b069-916f0fee7fc7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:59.000Z",
"modified": "2018-03-13T13:42:59.000Z",
"pattern": "[file:hashes.MD5 = 'dd1d1b2bd2bb8be3340c5e21a96abac1' AND file:hashes.SHA1 = '782a58281fd3b13b3cd0f824755cac5c2f72cb86' AND file:hashes.SHA256 = '1fe5990f49535a312c2067188aad878933a778a7d4d7d4724d08a5637a72b9d0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:42:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2693cbb3-ac2c-476e-a4bf-b199c7e88878",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:57.000Z",
"modified": "2018-03-13T13:42:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/1fe5990f49535a312c2067188aad878933a778a7d4d7d4724d08a5637a72b9d0/analysis/1520376506/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d561-694c-412e-a3dd-493d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "43/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d562-4674-437c-984e-4ed102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:26",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d562-b7cc-4562-a72c-460002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3bc0a925-001a-4ec0-b662-c6ffdfa883da",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:01.000Z",
"modified": "2018-03-13T13:43:01.000Z",
"pattern": "[file:hashes.MD5 = '61d4f2dde2e129c66caace0d04b665f8' AND file:hashes.SHA1 = 'b0281ff17dc7bb0f08e318d5bf2b01e7aa1e41d1' AND file:hashes.SHA256 = '49580ca29529de4ac3ce037c6bf5b9c675a9f770c7ec4d1203ce19391e0661ea']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9c4a8abf-36e5-45f2-9950-acb6fc6d6d8d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:42:59.000Z",
"modified": "2018-03-13T13:42:59.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/49580ca29529de4ac3ce037c6bf5b9c675a9f770c7ec4d1203ce19391e0661ea/analysis/1512484746/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d563-02d0-4580-9040-4d0b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "24/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d564-2de8-4868-a78f-476f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-05 14:39:06",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d564-c644-48b6-b384-4ba202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--de573c2e-d1b7-4454-830b-ee0de6ffebe7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:03.000Z",
"modified": "2018-03-13T13:43:03.000Z",
"pattern": "[file:hashes.MD5 = '9cb474c37d71ed352f69b0ae54ed8dfd' AND file:hashes.SHA1 = 'bbb8365cdfcfa1e8a4d414eb66c983c72f4451c2' AND file:hashes.SHA256 = '1ecf353cee0116eed985085707c29ba7a006da2975863f31372b3bd6a0ab7974']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2b361753-16d6-4b91-aa83-2241be1c2111",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:01.000Z",
"modified": "2018-03-13T13:43:01.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/1ecf353cee0116eed985085707c29ba7a006da2975863f31372b3bd6a0ab7974/analysis/1517937571/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d566-a8ec-4702-a4af-46c202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d566-78bc-49c1-91df-48bc02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-06 17:19:31",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d566-93d0-4739-9fc1-492202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f845f0d3-8a14-4cd0-ac52-b68a45ad6bd1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:05.000Z",
"modified": "2018-03-13T13:43:05.000Z",
"pattern": "[file:hashes.MD5 = '202858c4ab316d84e226abb28c26658f' AND file:hashes.SHA1 = '6bdb20ec6615cdf4e5e70dc66b8a1a9b9b5e0813' AND file:hashes.SHA256 = '7dac5f0299bdc8a36df6ca4eac7a649754a8c706b7211108b26cb0eeb1d72a67']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--22ac03b3-05b2-4cb3-b1cf-06a04d09b191",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:04.000Z",
"modified": "2018-03-13T13:43:04.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7dac5f0299bdc8a36df6ca4eac7a649754a8c706b7211108b26cb0eeb1d72a67/analysis/1520439453/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d568-4f38-474a-b723-4d4702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d568-e300-4a02-9e1a-4ed502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:17:33",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d568-8728-4588-b096-41b902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b7dc6423-6d05-411f-ab96-1f5fe5bff960",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:08.000Z",
"modified": "2018-03-13T13:43:08.000Z",
"pattern": "[file:hashes.MD5 = 'dc981a9f17968c5acb2f65be82a60bb4' AND file:hashes.SHA1 = '7b346a44ab9de76a4dd762ab124c0d43a4fcdbe7' AND file:hashes.SHA256 = '39fb5a2659b013894366ae3620a74ff5eb381e39c15ea76d148a93a9b43a5aeb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--99910c76-477b-4cf0-bae3-dd9aabed6f4c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:06.000Z",
"modified": "2018-03-13T13:43:06.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/39fb5a2659b013894366ae3620a74ff5eb381e39c15ea76d148a93a9b43a5aeb/analysis/1517932097/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d56a-89c8-4fe6-8b4c-44e702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d56b-0f08-41f2-afb2-44e002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-06 15:48:17",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d56b-74e4-4484-9a9c-411702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--db1db06e-a0ec-4bb8-b529-d8eb867e24c4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:10.000Z",
"modified": "2018-03-13T13:43:10.000Z",
"pattern": "[file:hashes.MD5 = '0eb8580ea0c1634a11e2fcd7fcfcae04' AND file:hashes.SHA1 = '03f59b018acbda4c6e63db913a78c70499323bc0' AND file:hashes.SHA256 = 'b84cac469c097e1296c00029f8ffb1b7e12fb791d10da6e01485079a7750958c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5fc6ede9-b781-4eb4-8c6a-a47a025901ef",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:08.000Z",
"modified": "2018-03-13T13:43:08.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b84cac469c097e1296c00029f8ffb1b7e12fb791d10da6e01485079a7750958c/analysis/1520446096/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d56c-a008-4322-adc1-476b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "22/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d56d-dc14-4e8d-aba9-458e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 18:08:16",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d56d-5c14-4b0f-90bd-4eda02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--42066cdc-d515-4c5e-b536-6403bd2fa1b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:12.000Z",
"modified": "2018-03-13T13:43:12.000Z",
"pattern": "[file:hashes.MD5 = 'd6229a6a24180bbf601015d9a14d4b1a' AND file:hashes.SHA1 = 'c5184154b100074ef4c743409ecee20f4b41b78e' AND file:hashes.SHA256 = 'f974b1b74f862028f1335b15ed98d1388cdc770b6770aac9b7cc62847d9dad32']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--869f01f6-7bb3-44b4-bc9e-8b736da289fa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:11.000Z",
"modified": "2018-03-13T13:43:11.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f974b1b74f862028f1335b15ed98d1388cdc770b6770aac9b7cc62847d9dad32/analysis/1520441475/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d56f-20dc-4a3f-8962-4ba602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d56f-8198-4f5f-a3c4-449102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:51:15",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d56f-b4ec-431e-b0e8-477202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b2a4407f-5430-4c80-bf8f-507f234cdf38",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:15.000Z",
"modified": "2018-03-13T13:43:15.000Z",
"pattern": "[file:hashes.MD5 = '231d4f2c7eb9b8af7915e3ca4d4c1d2b' AND file:hashes.SHA1 = '55e714a36a7922274733ffaf8ddbb9ff77787c22' AND file:hashes.SHA256 = 'c273a69f39e66cf687f1d9089e7c21191f265c34c0dded99cefea57df8509c24']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--081ea566-bd34-49d7-be26-ccbb3ad585d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:13.000Z",
"modified": "2018-03-13T13:43:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/c273a69f39e66cf687f1d9089e7c21191f265c34c0dded99cefea57df8509c24/analysis/1520908441/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d571-e298-4d94-ab21-4c0802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d571-6a9c-43ae-a888-4ded02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 02:34:01",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d571-36ec-423a-a9ac-422b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4baac2f7-b640-49ea-aa37-60ae3a4b7e66",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:17.000Z",
"modified": "2018-03-13T13:43:17.000Z",
"pattern": "[file:hashes.MD5 = 'a0244651058e342d7ecaf380dc9c3b2d' AND file:hashes.SHA1 = '1c78794d44a4c668c2e48904ab35cf13a465eb78' AND file:hashes.SHA256 = 'fe206a8849d7f95e4233effa97883a03e2d8d3672c0b9af18dcf9d5d59b9f22b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--93f77b86-ed4f-4313-8c22-6010b7795a8d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:15.000Z",
"modified": "2018-03-13T13:43:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/fe206a8849d7f95e4233effa97883a03e2d8d3672c0b9af18dcf9d5d59b9f22b/analysis/1520488614/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d573-4bfc-4256-87e3-420002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d574-ba88-4b52-8219-484c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:56:54",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d574-e8e0-4d19-84da-456202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7baf9480-e568-41e6-a1f1-fff7d516fbb1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:19.000Z",
"modified": "2018-03-13T13:43:19.000Z",
"pattern": "[file:hashes.MD5 = '42f64228b2af7b7e7894e37c6ae0f304' AND file:hashes.SHA1 = '92b154bb810093dcde3225c6b524f30d1731a5ad' AND file:hashes.SHA256 = '932be9385b60b1b2f7d2e2861a9b568a291846ecf0227413417c99d2d16785c0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b8d85b22-76dc-4882-85ac-0fb0f74b754f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:18.000Z",
"modified": "2018-03-13T13:43:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/932be9385b60b1b2f7d2e2861a9b568a291846ecf0227413417c99d2d16785c0/analysis/1511812798/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d576-86ac-4c8d-8f27-46f202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "42/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d576-48ac-453c-9928-465202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-27 19:59:58",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d576-62a0-4f2a-9364-470902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--70733fd0-6c28-4129-980c-8ff97d139d43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:22.000Z",
"modified": "2018-03-13T13:43:22.000Z",
"pattern": "[file:hashes.MD5 = 'bbf3be06a6f4b6b34af48f55072da837' AND file:hashes.SHA1 = '4ee432a723f26b76fd7f91991b297e57b0913562' AND file:hashes.SHA256 = 'f23d4daa59e771990a4ed13100d5a39454c89e3c01ccfb6bfa9b3257dcd51b13']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--808e6a5f-a93e-48f1-8678-d5f32b61f516",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:20.000Z",
"modified": "2018-03-13T13:43:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f23d4daa59e771990a4ed13100d5a39454c89e3c01ccfb6bfa9b3257dcd51b13/analysis/1520441264/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d578-ac44-4fa7-b45a-489a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d578-2f94-4f41-874a-42da02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:47:44",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d579-7c58-49f2-983e-415202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--86a9886d-1f0c-48e5-978c-8f96df99efed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:24.000Z",
"modified": "2018-03-13T13:43:24.000Z",
"pattern": "[file:hashes.MD5 = 'b5cefb3abd3aaced7715e7bb325dc275' AND file:hashes.SHA1 = 'eb3f2713305b54519e3e2e81cc2200e57f38a4e3' AND file:hashes.SHA256 = '19212bfe27243227b15d7fb9e454d2c624e5d6cf847b8750a4a9b5ad55aec14d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--980fe535-bfc5-45db-979a-1c6e45bfa4b4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:22.000Z",
"modified": "2018-03-13T13:43:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/19212bfe27243227b15d7fb9e454d2c624e5d6cf847b8750a4a9b5ad55aec14d/analysis/1516315723/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d57a-2c74-461d-91df-444a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d57b-47e0-4b56-be67-491102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-18 22:48:43",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d57b-e7dc-4198-a5fb-4f7802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--991239b6-a59d-4891-9365-3297334f53b8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:26.000Z",
"modified": "2018-03-13T13:43:26.000Z",
"pattern": "[file:hashes.MD5 = 'c80c5e98a77e1ec30fd1ed74f25726b4' AND file:hashes.SHA1 = 'b4f0a39ce7779e96049d91d02bcae95feb189247' AND file:hashes.SHA256 = 'aa96c4de7bc4edeb68bd03a6a5455139e389e4e40e154732ddce3255e2f7efe6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e5931a6d-c9d6-4c85-9184-45c54d0896e5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:24.000Z",
"modified": "2018-03-13T13:43:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/aa96c4de7bc4edeb68bd03a6a5455139e389e4e40e154732ddce3255e2f7efe6/analysis/1520913598/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d57d-31ac-465f-9ef6-42a502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d57d-8d6c-4511-9b94-469002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:59:58",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d57d-6940-4389-b6c3-4f3a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--af070041-9ff6-4592-b8f9-c8321cb360ab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:29.000Z",
"modified": "2018-03-13T13:43:29.000Z",
"pattern": "[file:hashes.MD5 = '3b687c516e1269c54c04e709ce0826a0' AND file:hashes.SHA1 = 'aeffe4e76999e2f738ea72f2d1979f5e0c9e3bca' AND file:hashes.SHA256 = 'd942f42f13aebdeff0f6d2ad02ba0d86d7ef7bfb070fec0e32e0aa8851032e9d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3b6371b2-89d5-4271-ada4-05f54fd4ceb7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:27.000Z",
"modified": "2018-03-13T13:43:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d942f42f13aebdeff0f6d2ad02ba0d86d7ef7bfb070fec0e32e0aa8851032e9d/analysis/1515019768/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d57f-4a40-43a9-a27c-4bfe02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d580-ebcc-42f7-872a-4bce02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 22:49:28",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d580-b81c-4cb6-aafc-40e202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e518371a-6ff1-4160-86db-52fd485c75ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:31.000Z",
"modified": "2018-03-13T13:43:31.000Z",
"pattern": "[file:hashes.MD5 = '388a0cccf56767b28f0ebebf746d938b' AND file:hashes.SHA1 = 'ee90cdd76a34113982c3d4fde6c675eeeb6d2b2f' AND file:hashes.SHA256 = '7210f0314f4814b28c2157e10d4ffdb10bd575dab6b93c90027820e16e2b109d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--16b70a36-22ec-44de-9284-c8513068cae6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:30.000Z",
"modified": "2018-03-13T13:43:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7210f0314f4814b28c2157e10d4ffdb10bd575dab6b93c90027820e16e2b109d/analysis/1518015249/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d582-678c-455c-b46b-49b102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d582-b040-4422-9d97-4f2402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-07 14:54:09",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d582-2d18-4e7a-934f-43b702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--774d6ed8-303c-4a84-935d-f3ac619f4e8f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:34.000Z",
"modified": "2018-03-13T13:43:34.000Z",
"pattern": "[file:hashes.MD5 = '82d5bc54464e1d903cb806b9cc66faa7' AND file:hashes.SHA1 = 'f7a48cdfc7dccc4db70fc2d96058020ade558264' AND file:hashes.SHA256 = 'e9c24d0a80b622749a1b30f9d384a7cdd844310dbd3054898ec322cfabb65280']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--dc1da038-6340-42d1-ba26-176fe9bcded0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:32.000Z",
"modified": "2018-03-13T13:43:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e9c24d0a80b622749a1b30f9d384a7cdd844310dbd3054898ec322cfabb65280/analysis/1520376486/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d584-4dc8-4e15-a1f1-4ed702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "25/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d584-e5f4-4aed-bfa8-4eb002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:06",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d584-e470-4205-8123-44f502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f6f9fee4-876e-4765-ac1f-923a8e449811",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:36.000Z",
"modified": "2018-03-13T13:43:36.000Z",
"pattern": "[file:hashes.MD5 = 'ee6907f199304c605ee5ddd6218952c3' AND file:hashes.SHA1 = 'e9f6fee09c9cc8fb0c2786a8849e9b0fb7cb7bc5' AND file:hashes.SHA256 = '3e6b779c02e528436709c1873f5282453326c2f6ef1b9c4e1f6ff8f868728d80']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6c106bd5-9842-4461-b8dd-0faa223d2c68",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:34.000Z",
"modified": "2018-03-13T13:43:34.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3e6b779c02e528436709c1873f5282453326c2f6ef1b9c4e1f6ff8f868728d80/analysis/1426915074/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d586-6368-44f2-bad3-484002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/57",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d587-63d4-423e-b0f3-401b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2015-03-21 05:17:54",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d587-fb90-4418-9bd5-431e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ef7ab321-e2e2-45d6-a76b-ed61d6ccbdba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:38.000Z",
"modified": "2018-03-13T13:43:38.000Z",
"pattern": "[file:hashes.MD5 = 'd91e921a957f1f6e8b1a546982e5ab28' AND file:hashes.SHA1 = 'e92a5e6c6f11da81f76d2b59958c1c73d192c846' AND file:hashes.SHA256 = '3b48246dc4b173a48a8fc04fcd4809fae45b8c73b0d33caa7052ef4b327fcbec']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fccef241-584e-4a8c-bcac-44550ac946a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:36.000Z",
"modified": "2018-03-13T13:43:36.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3b48246dc4b173a48a8fc04fcd4809fae45b8c73b0d33caa7052ef4b327fcbec/analysis/1520488428/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d589-dd44-4141-ba42-4a1502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/65",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d589-0388-444d-9a1c-426802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:53:48",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d589-2a8c-4fcd-a3cc-414502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--972390dc-b051-4c4f-952a-2daca6c94e2a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:41.000Z",
"modified": "2018-03-13T13:43:41.000Z",
"pattern": "[file:hashes.MD5 = 'c24649b599e56bb433da287298da98d0' AND file:hashes.SHA1 = '6bf878e76540e8eeb2c06a3f15fbf07baa1eaaef' AND file:hashes.SHA256 = '62e3f58ec80fac52b6d1c12b17254c254b5113a70e8510df7b9bd49314aec00f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6d2857f8-cde7-49a7-86f7-27711cde2de0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:39.000Z",
"modified": "2018-03-13T13:43:39.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/62e3f58ec80fac52b6d1c12b17254c254b5113a70e8510df7b9bd49314aec00f/analysis/1520194921/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d58b-6bc8-4c68-8588-4d1502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "40/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d58c-8bd4-45bc-a34a-449d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-04 20:22:01",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d58c-37f4-4aea-8c2d-4e3902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6c18de88-4e54-4aca-8333-7b6002fc6581",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:43.000Z",
"modified": "2018-03-13T13:43:43.000Z",
"pattern": "[file:hashes.MD5 = '0fccc1bf870df0df3b48e0b0ed50e5d5' AND file:hashes.SHA1 = 'b3a442888010182a411a7b19ebc21d55da83aecc' AND file:hashes.SHA256 = 'b0e2cef91b30ab96b6893659537a44986767272dfc2438af8281455af0f892e0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3fe466f9-e2a4-4cd9-85fe-b5985c458e79",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:42.000Z",
"modified": "2018-03-13T13:43:42.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b0e2cef91b30ab96b6893659537a44986767272dfc2438af8281455af0f892e0/analysis/1520909820/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d58e-ad0c-4cb7-a9dc-4d0e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d58e-f74c-4b07-9bb4-4f6002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 02:57:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d58e-e0a0-45d2-a7a1-492802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c0777536-9c34-4420-ad25-8a811bf2948c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:46.000Z",
"modified": "2018-03-13T13:43:46.000Z",
"pattern": "[file:hashes.MD5 = '918c7b5973b7205ca1e065561e403a29' AND file:hashes.SHA1 = 'a098c3094d73821f609be84ee5043fd3c5605d95' AND file:hashes.SHA256 = 'bf490a1a63c7e23b4afbe9140955b587457fef2c281c38defd8cde2c76c6f65b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--eeac1674-b2c3-403a-af56-098d62b62f9d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:44.000Z",
"modified": "2018-03-13T13:43:44.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/bf490a1a63c7e23b4afbe9140955b587457fef2c281c38defd8cde2c76c6f65b/analysis/1520440919/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d590-e71c-4689-ba83-4c0102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d590-8864-4af0-83d8-444a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:41:59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d590-d454-4164-90e8-47b102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ad0bbb06-2204-4a91-a97c-85d1f2c8bedc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:48.000Z",
"modified": "2018-03-13T13:43:48.000Z",
"pattern": "[file:hashes.MD5 = '40b5f45c83732b8678240fdf45e4a0d2' AND file:hashes.SHA1 = 'd6c16f055b0ea9ac5a5dec4cd42aa7b0e33412ec' AND file:hashes.SHA256 = '258e9ac0aff2d08496427b988d5f98234d3098329f116202ac1a1c9e5afd272a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c511bbf9-ee03-472f-9275-86e54f87e603",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:46.000Z",
"modified": "2018-03-13T13:43:46.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/258e9ac0aff2d08496427b988d5f98234d3098329f116202ac1a1c9e5afd272a/analysis/1520437768/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d592-c2ec-463f-84a9-466102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d593-42ac-4621-ae4c-49da02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:49:28",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d593-7614-47a7-afe8-47a502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--181cb412-06ff-42e2-9e5c-f3b5a7f11780",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:50.000Z",
"modified": "2018-03-13T13:43:50.000Z",
"pattern": "[file:hashes.MD5 = '8ee304efa087574c9df940ab2ca5474e' AND file:hashes.SHA1 = '024652ecbfa0bad984f890fd3cf94e37cf783e01' AND file:hashes.SHA256 = 'f11b7237907275ca59ce4f0b630f69a6c3770b0060359917bf465690e2309e47']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d09085d8-c050-4efa-8e91-586e9207ef3c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:49.000Z",
"modified": "2018-03-13T13:43:49.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f11b7237907275ca59ce4f0b630f69a6c3770b0060359917bf465690e2309e47/analysis/1520441209/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d595-06c0-48ea-8958-440e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d595-3a90-4926-a08d-4d9d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:46:49",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d595-e288-4552-9005-426c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7fadae6d-0f96-456c-8717-ce5168fcd964",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:53.000Z",
"modified": "2018-03-13T13:43:53.000Z",
"pattern": "[file:hashes.MD5 = 'faa964161704ee5e807983065dcfe4a9' AND file:hashes.SHA1 = '68b0972217652e01df2d894de261bced0e58f2ce' AND file:hashes.SHA256 = '0acc741c806c8c0bed64d14d6a9d69580ece212e6517ffced865c2be31bf72fd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5978498f-332b-46d5-ac8b-5da2f33ba5fc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:51.000Z",
"modified": "2018-03-13T13:43:51.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0acc741c806c8c0bed64d14d6a9d69580ece212e6517ffced865c2be31bf72fd/analysis/1520909460/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d597-3790-4b5b-a0d2-445a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d598-0d0c-4e3f-a73e-4b6d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 02:51:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d598-6b00-41f8-834a-438402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--84d40159-8f0c-400c-8d61-34ea3ee11fd5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:55.000Z",
"modified": "2018-03-13T13:43:55.000Z",
"pattern": "[file:hashes.MD5 = '0b42241d62892e79ba105f81e2132c7c' AND file:hashes.SHA1 = 'cd1d007ec54c80fd222d6e7fb847546af539deb7' AND file:hashes.SHA256 = 'a51dbcb87d67fc1edb0be26d35a632140383b47d2ba16c053825b551cf152f3d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fa3049b4-4fb2-4010-b3d6-df251f5e601d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:53.000Z",
"modified": "2018-03-13T13:43:53.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a51dbcb87d67fc1edb0be26d35a632140383b47d2ba16c053825b551cf152f3d/analysis/1520912414/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d599-ffcc-4ac5-a1a2-4aff02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "38/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d59a-4044-4673-afc0-4a0902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:40:14",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d59a-1dc8-4fe3-8be6-4d4702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--97613f9a-68d6-4e2b-92a4-99963309ce91",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:57.000Z",
"modified": "2018-03-13T13:43:57.000Z",
"pattern": "[file:hashes.MD5 = '3e2c9fe205543b825746ebed07976b65' AND file:hashes.SHA1 = 'f63603f75fc2c562df52a8dfefcff39538cefbcb' AND file:hashes.SHA256 = 'b3dbbe79bdbf9e6d6a8eb1bcc9350f847b76aaf304bc981dca9fdf281ba22360']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:43:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--be1dbba5-f49d-4dc9-b130-19e084d25584",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:56.000Z",
"modified": "2018-03-13T13:43:56.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b3dbbe79bdbf9e6d6a8eb1bcc9350f847b76aaf304bc981dca9fdf281ba22360/analysis/1520440577/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d59c-6568-4a4d-84c2-4be602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d59c-c33c-4146-939d-439902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:36:17",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d59c-3e4c-4e45-a948-434302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9850420f-b885-45a9-a6e2-af2380c164a7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:00.000Z",
"modified": "2018-03-13T13:44:00.000Z",
"pattern": "[file:hashes.MD5 = 'da871572b4645baab4032cf470d1e9d5' AND file:hashes.SHA1 = '7b704ff1d98e0afd2237fc32515aa8f6e8504761' AND file:hashes.SHA256 = 'e89d9478aa4451584a1e6263dafaa39059e0aac3b1c02f00c64705bbb5449a43']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--09920e57-e715-4c54-b158-9a9ee4b11723",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:43:58.000Z",
"modified": "2018-03-13T13:43:58.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e89d9478aa4451584a1e6263dafaa39059e0aac3b1c02f00c64705bbb5449a43/analysis/1501377522/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d59e-3e30-4630-befa-42ce02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/65",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d59e-ac70-463f-95e2-44cf02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-07-30 01:18:42",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d59e-46cc-453b-92a5-4cb402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e4a8088c-bb92-4cff-9775-8f2369d9c9d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:02.000Z",
"modified": "2018-03-13T13:44:02.000Z",
"pattern": "[file:hashes.MD5 = '1d4072881433bca562cc74753310fce3' AND file:hashes.SHA1 = '9d3b0622279c5a862946c2e68f2da0127bf046dc' AND file:hashes.SHA256 = '5abc641c6f48c2ef5e8886085e375cdda5ab5ea47b2f935c1060232e8795d030']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5850fabb-73d0-4f76-a406-a6f7e27b0b09",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:00.000Z",
"modified": "2018-03-13T13:44:00.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5abc641c6f48c2ef5e8886085e375cdda5ab5ea47b2f935c1060232e8795d030/analysis/1520903460/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5a0-25c8-4968-b89c-42db02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5a1-2c78-410f-ae43-49db02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 01:11:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5a1-2018-4fe4-b135-476402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e60f450e-6f03-470e-9126-dc098b8138a0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:04.000Z",
"modified": "2018-03-13T13:44:04.000Z",
"pattern": "[file:hashes.MD5 = '21ab6e815063f66de014230f2d13bda1' AND file:hashes.SHA1 = '26ab72a7420d6538c6aa6186c23a27eb874e78eb' AND file:hashes.SHA256 = 'dcf687e47e3ff38a34ab94cf0651e6a45a7d63ee4c7668bfbe3ebc375da3d7ba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--eef7f7bc-bb25-4b04-9930-1d76137be36e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:02.000Z",
"modified": "2018-03-13T13:44:02.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/dcf687e47e3ff38a34ab94cf0651e6a45a7d63ee4c7668bfbe3ebc375da3d7ba/analysis/1517469637/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5a2-4b44-4f0c-a0c4-404002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5a3-72a0-471e-89b4-40f902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-01 07:20:37",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5a3-a078-4ca4-99b8-4d8f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--110e5750-cf74-4fe0-9af7-59757472d6e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:06.000Z",
"modified": "2018-03-13T13:44:06.000Z",
"pattern": "[file:hashes.MD5 = '769bfb1fd8f5eb181846c6d55845fec6' AND file:hashes.SHA1 = '39212552a49b7097a7f6409f80141adb14ef04be' AND file:hashes.SHA256 = '8d74ae7b6a50c748ded262a822aa429a65666b965862ff2f4edafcd3a6f622d8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c2a69426-1e1e-4522-b6dc-a3833d75a33e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:05.000Z",
"modified": "2018-03-13T13:44:05.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8d74ae7b6a50c748ded262a822aa429a65666b965862ff2f4edafcd3a6f622d8/analysis/1520439824/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5a5-fb5c-48f6-846d-4d4602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5a5-4f04-4b0f-a582-4f1d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:23:44",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5a5-5eec-4920-95d4-43c502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--60afce5d-2b5c-4c36-ab17-ab9544a2744e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:09.000Z",
"modified": "2018-03-13T13:44:09.000Z",
"pattern": "[file:hashes.MD5 = '2b9bead7066d932743ca82e2e90e482a' AND file:hashes.SHA1 = '97b132de05a2ccca487bdc19ce10db493c18bba2' AND file:hashes.SHA256 = 'bb4eeb211e54b55d35f7b46ab85420e2ed033c0594f906aef7495430d30bb7f7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b80f6804-4169-4522-825b-985b9349fabc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:07.000Z",
"modified": "2018-03-13T13:44:07.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/bb4eeb211e54b55d35f7b46ab85420e2ed033c0594f906aef7495430d30bb7f7/analysis/1514997361/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5a7-4fe0-4f7c-8d56-4ee002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5a8-9ef0-42fb-aacc-469602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 16:36:01",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5a8-c910-4b91-bc28-443502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--20408dac-7c98-4bcf-bd33-a53de3436da3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:11.000Z",
"modified": "2018-03-13T13:44:11.000Z",
"pattern": "[file:hashes.MD5 = '1713e740fb8f42d3124ca0103dbb527b' AND file:hashes.SHA1 = '55a5d61bdc3dc1a529099b00b926ead174f5e7f0' AND file:hashes.SHA256 = '38a80f5c92fa7444b757f8cba214ab7db7b4a57a38a432f56a0aaba7e80c692c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9a547937-9c10-4da0-8147-fa1e898ed8bc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:10.000Z",
"modified": "2018-03-13T13:44:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/38a80f5c92fa7444b757f8cba214ab7db7b4a57a38a432f56a0aaba7e80c692c/analysis/1520906952/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5aa-c81c-495a-9bac-4d9402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5aa-1848-4c18-92ab-443d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 02:09:12",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5aa-6328-46a2-9974-4e7102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b9ebd188-91d8-4229-8b64-13d8daa59f3e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:14.000Z",
"modified": "2018-03-13T13:44:14.000Z",
"pattern": "[file:hashes.MD5 = '1f2774a86fc782d73799a3c7c70d094a' AND file:hashes.SHA1 = '02ac7f9bbaa926ae27a1459098943e4b02557b91' AND file:hashes.SHA256 = '9b636ae57cc03448c09ba6501fd71a2885a947db2295365cfe1fb3df3900f72b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d6008b30-2b4b-4d67-b609-7d7a5604ab1d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:12.000Z",
"modified": "2018-03-13T13:44:12.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9b636ae57cc03448c09ba6501fd71a2885a947db2295365cfe1fb3df3900f72b/analysis/1520376534/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5ac-5c2c-48e4-96b8-41d002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5ad-b0ec-4a9e-8ac4-42aa02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:54",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5ad-bf04-41b2-b6d7-428002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--682d3605-86dd-4f7e-80f2-a99ad1dd4e70",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:16.000Z",
"modified": "2018-03-13T13:44:16.000Z",
"pattern": "[file:hashes.MD5 = 'b8fd3d256e15909d5008f298aaf46b8f' AND file:hashes.SHA1 = '02e90b14cc5437357f5539cfee7be4dedc3c1871' AND file:hashes.SHA256 = '01b3d5de0e7c80516811276c31c2ba5d10020f04a7f7be5517c0fb2f452b8fcc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d94c34c7-d78d-4d62-82e9-911bc6d298bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:14.000Z",
"modified": "2018-03-13T13:44:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/01b3d5de0e7c80516811276c31c2ba5d10020f04a7f7be5517c0fb2f452b8fcc/analysis/1503683054/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5ae-6f70-4b25-9ecd-491802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/65",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5af-f824-496d-b20a-412e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-08-25 17:44:14",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5af-2490-4b09-8a13-43ee02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1a99a2de-2373-4621-a8fb-3810a2d1e0b3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:18.000Z",
"modified": "2018-03-13T13:44:18.000Z",
"pattern": "[file:hashes.MD5 = 'b28f3ade5237a99db046b52d00a4e12c' AND file:hashes.SHA1 = 'f670e53a32369cba2da1efa3e0560b03b54fc56a' AND file:hashes.SHA256 = '90ca9d15eb5815f8b3302fc35c8c67fc7481198a1c91eb3970799fc3782eba6b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1d9c8849-48b1-4c5a-86c1-23c30aa5bd85",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:16.000Z",
"modified": "2018-03-13T13:44:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/90ca9d15eb5815f8b3302fc35c8c67fc7481198a1c91eb3970799fc3782eba6b/analysis/1520439955/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5b1-43d4-4b6c-ab66-4c9002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5b1-a3f4-40b4-a67b-41ea02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:25:55",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5b1-f1b4-4cd9-a872-4dfd02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--98b8fd89-339b-4f7a-ab5b-9c386741f7f4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:20.000Z",
"modified": "2018-03-13T13:44:20.000Z",
"pattern": "[file:hashes.MD5 = 'd41be2ba18cd5e6326c6298caadac02b' AND file:hashes.SHA1 = '772d19b5c243256bc67f0ab7b9985adba7896ff5' AND file:hashes.SHA256 = 'e37bbf95ce83592f7c72d548842cb33be5d473bf1cb18dd9910edb9692fcf1b5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a255438b-ec32-4257-8de6-dc7a054f4126",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:19.000Z",
"modified": "2018-03-13T13:44:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e37bbf95ce83592f7c72d548842cb33be5d473bf1cb18dd9910edb9692fcf1b5/analysis/1520488608/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5b3-ce64-479b-a616-4a6c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "53/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5b3-25b0-439c-877d-4fb902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:56:48",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5b3-fe98-441e-be9b-415702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--639a5e0f-c87f-4c39-bb1f-0443c6fe085f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:23.000Z",
"modified": "2018-03-13T13:44:23.000Z",
"pattern": "[file:hashes.MD5 = 'ec8bae15417dcc2ba4b92a03904ef297' AND file:hashes.SHA1 = 'f1879f675834d2ac2db61ca72033b5e7ef892881' AND file:hashes.SHA256 = 'f584ec598c2926ecd0ee48c84a0a4e6d780de993281f390f6f93f014649fd2f2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b70cf9ce-61c3-4cc0-84d1-d2848d3e98e8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:21.000Z",
"modified": "2018-03-13T13:44:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f584ec598c2926ecd0ee48c84a0a4e6d780de993281f390f6f93f014649fd2f2/analysis/1520441343/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5b5-4558-4401-9ec9-4c3902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/50",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5b6-6418-4f78-8fc8-491802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:49:03",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5b6-1a64-489d-8bf6-425402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--baf077d1-6aca-4cbc-ba3f-33bda3b9411b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:25.000Z",
"modified": "2018-03-13T13:44:25.000Z",
"pattern": "[file:hashes.MD5 = '23eec7f5200a0a96372d42f862cb9ac0' AND file:hashes.SHA1 = '1792d418c1283c72997c8f119267437c3589316f' AND file:hashes.SHA256 = '8f29b3bc0ee8bdb00971576403db7854b3a59a8997fd7ccced8d23e834455d36']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--712481dd-995d-491f-b929-5e3322c631ec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:23.000Z",
"modified": "2018-03-13T13:44:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8f29b3bc0ee8bdb00971576403db7854b3a59a8997fd7ccced8d23e834455d36/analysis/1512451457/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5b7-f288-4b50-9530-4f1402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5b8-93b0-42d9-867e-491602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-05 05:24:17",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5b8-7660-43af-8f21-4e2f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--13d8d248-26dd-4144-a295-f5359295233d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:27.000Z",
"modified": "2018-03-13T13:44:27.000Z",
"pattern": "[file:hashes.MD5 = 'c9511b0a15b9c982718ae0b1e0233a1c' AND file:hashes.SHA1 = '1e2ff89055f785067ba277d29e8857b2ce3e7cf1' AND file:hashes.SHA256 = '112a5ebecf43d35c9e196e49dedd8c7763bc8d05b175383303f7ae81b3e90a16']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2a7d70a1-7b62-4ab4-8e52-eb2580366dfa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:25.000Z",
"modified": "2018-03-13T13:44:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/112a5ebecf43d35c9e196e49dedd8c7763bc8d05b175383303f7ae81b3e90a16/analysis/1511906538/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5b9-dfb4-4597-9dc0-4d1602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5ba-fe70-4bc4-b1c5-464502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-28 22:02:18",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5ba-34dc-4531-90ac-486a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--be3b992c-a86f-4e3d-a44b-1e319fa67c66",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:29.000Z",
"modified": "2018-03-13T13:44:29.000Z",
"pattern": "[file:hashes.MD5 = '3caaa4e73ce36a5a784722e8f3414779' AND file:hashes.SHA1 = 'a8498b821900f38185d4c06020c1947c128e3386' AND file:hashes.SHA256 = 'f4b997725f499272c992b611b85db6b23f5b147319c0db0f093550178cbc1a17']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--34447c7d-838f-4cb6-b8d0-0a9f0a0af702",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:28.000Z",
"modified": "2018-03-13T13:44:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f4b997725f499272c992b611b85db6b23f5b147319c0db0f093550178cbc1a17/analysis/1516397468/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5bc-6b74-44c9-b843-422002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "25/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5bc-7550-4671-9017-456502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-19 21:31:08",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5bc-d3bc-45bb-b4c6-45f102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2bd8f5ed-adf0-45ff-ada9-9bed3a4060ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:32.000Z",
"modified": "2018-03-13T13:44:32.000Z",
"pattern": "[file:hashes.MD5 = 'f74922ce7ac99535b83c3ade20f9b428' AND file:hashes.SHA1 = '982539d33a7944013a0754af637779e1d8b43c12' AND file:hashes.SHA256 = 'b1f2c4c3e837e4971a0cb2db3763e8785b0c34a65c073a890963b35ead55eff0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ac8f6787-b5f5-4ee6-b1a0-0b303f34ab29",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:30.000Z",
"modified": "2018-03-13T13:44:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b1f2c4c3e837e4971a0cb2db3763e8785b0c34a65c073a890963b35ead55eff0/analysis/1520440524/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5be-a644-4e5f-8dcb-4d6e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5be-90b0-43b3-87bf-485e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:35:24",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5be-d54c-4f70-97e2-41f302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c41a3658-a663-4d02-96a1-31891e0a2b70",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:34.000Z",
"modified": "2018-03-13T13:44:34.000Z",
"pattern": "[file:hashes.MD5 = '545398e1262524708ea1b011d9117e32' AND file:hashes.SHA1 = 'cbced3cab25b1325becc8bb4dd8fd4e160be3886' AND file:hashes.SHA256 = '2b4b4ead7f8a7b11e126d8c6a4199163e8debe33ea3a0b86bba78f92a6ee1740']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0bdb8b75-3f37-4741-b0b9-5c45ed8f0468",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:32.000Z",
"modified": "2018-03-13T13:44:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/2b4b4ead7f8a7b11e126d8c6a4199163e8debe33ea3a0b86bba78f92a6ee1740/analysis/1512188149/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5c0-af94-405f-b3d0-414302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5c1-ac00-4f44-9e8c-4ca402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-02 04:15:49",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5c1-9ca0-4bd4-9726-466702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d68f2720-4b5e-4632-a07c-161efaa36753",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:36.000Z",
"modified": "2018-03-13T13:44:36.000Z",
"pattern": "[file:hashes.MD5 = 'a1e180b43298009dc514931b025d48f6' AND file:hashes.SHA1 = 'ee70818c906af82d5cab313885695d3339546d98' AND file:hashes.SHA256 = '5d15801241768974654ef7f4bb2e5914a6fbf9b628421a237c64bd6031949a1a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--62a200f5-ada3-489e-8be4-0f841b49ccf1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:35.000Z",
"modified": "2018-03-13T13:44:35.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5d15801241768974654ef7f4bb2e5914a6fbf9b628421a237c64bd6031949a1a/analysis/1507385515/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5c3-cac0-418c-97c3-414702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "43/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5c3-f6dc-418e-990f-441902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-10-07 14:11:55",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5c3-5cb4-43e7-a301-4b7502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2d4e2c18-2028-4f1e-a670-a518a678dd03",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:39.000Z",
"modified": "2018-03-13T13:44:39.000Z",
"pattern": "[file:hashes.MD5 = '981c80386599f9922c4f34fdc7a4d49a' AND file:hashes.SHA1 = '3935ba570fb257c255efd433251b2234b0a3f771' AND file:hashes.SHA256 = 'e112816a6380c8dd1c242ff911c2e59331615443fec86f5125e51ab10db1ad43']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9e3d433c-19c8-471a-a95e-f645423a88c3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:37.000Z",
"modified": "2018-03-13T13:44:37.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e112816a6380c8dd1c242ff911c2e59331615443fec86f5125e51ab10db1ad43/analysis/1520324700/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5c5-7cb0-40ea-89c1-476802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5c5-cd9c-4393-bc8d-401602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 08:25:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5c5-13dc-44a5-bdaf-4dc802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1656bc8a-bb59-41ee-b95b-4d8c7709675b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:41.000Z",
"modified": "2018-03-13T13:44:41.000Z",
"pattern": "[file:hashes.MD5 = '557b1b7fc85e307b26f3cad2aabcfbbc' AND file:hashes.SHA1 = '4c9984a254c5c453a591fbc09edc916a43bec505' AND file:hashes.SHA256 = '9ab27bf6a30dd835d19c438bee3feeede1749c0ba9ef42fd601830f3950beab6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--93704ecb-f463-4722-92f8-61dea8ddeb24",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:39.000Z",
"modified": "2018-03-13T13:44:39.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9ab27bf6a30dd835d19c438bee3feeede1749c0ba9ef42fd601830f3950beab6/analysis/1520870521/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5c7-11c0-4ee6-9101-4c0402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5c8-9af4-41d1-9ad4-409502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 16:02:01",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5c8-1dc8-4b21-9a78-49fa02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cf0a1d5f-2e78-44fb-8ca1-850ba3b02c9b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:43.000Z",
"modified": "2018-03-13T13:44:43.000Z",
"pattern": "[file:hashes.MD5 = '080f0040dbb1f961ff07cb924148d425' AND file:hashes.SHA1 = 'c8a9b0f2afd784ef175cbed50f467299597c3600' AND file:hashes.SHA256 = '5c40c4454fc289f9b240eb5419adce33b4b146753b5fb4404aaad4ca81ea24e6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ee2d4946-ea46-4614-929b-b892f9908209",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:41.000Z",
"modified": "2018-03-13T13:44:41.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5c40c4454fc289f9b240eb5419adce33b4b146753b5fb4404aaad4ca81ea24e6/analysis/1520438755/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5c9-e5b8-4ca2-afa9-42ae02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5ca-9784-4f7f-bb1f-4d0102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:05:55",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5ca-d624-4a16-8c4a-475102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ee5ee3f3-5de5-420c-a078-ecb7b097731d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:45.000Z",
"modified": "2018-03-13T13:44:45.000Z",
"pattern": "[file:hashes.MD5 = '9c6e3682443464eb6dd47b837dc1c5b9' AND file:hashes.SHA1 = 'eaee53d4f5fbf876643c8081f22b015da4042df3' AND file:hashes.SHA256 = '6b5b633e0cf8ad1537f89e9783b2ce771b2097047af940856277d56a2b04bbcb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--db8dfdee-1040-4e3e-9c50-bafef41f9cd8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:44.000Z",
"modified": "2018-03-13T13:44:44.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/6b5b633e0cf8ad1537f89e9783b2ce771b2097047af940856277d56a2b04bbcb/analysis/1520439053/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5cc-9b94-4f3f-882b-49a602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5cc-3df8-4014-93a7-493402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:10:53",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5cc-9cc0-4f3a-8c12-412502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0b5f6c32-9395-4cbd-a0bf-dd0d0530e2a8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:47.000Z",
"modified": "2018-03-13T13:44:47.000Z",
"pattern": "[file:hashes.MD5 = 'a0d15a805ea720104a81515ea4b5c3e3' AND file:hashes.SHA1 = 'd13fd2553351140c70b15d477c6805a1bc0dd71a' AND file:hashes.SHA256 = '7e1fa4807e9314f54b8c59d1fe9745412566b7c2d4fbcbef8078782d96f4e10b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--33eda59f-9e49-43f3-958d-a55e2a6f1166",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:46.000Z",
"modified": "2018-03-13T13:44:46.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7e1fa4807e9314f54b8c59d1fe9745412566b7c2d4fbcbef8078782d96f4e10b/analysis/1513342535/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5ce-6278-41ae-9786-47f602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5cf-cca4-4f2e-b15b-4b1f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-15 12:55:35",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5cf-a5d0-4740-8744-497e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c1fb6054-0e84-4bb2-a205-389fc558673a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:50.000Z",
"modified": "2018-03-13T13:44:50.000Z",
"pattern": "[file:hashes.MD5 = '76e947dbc4f073a1f050eade9f73f8a4' AND file:hashes.SHA1 = 'bb485a1223e3ca242a3a9e07090f047cdfe0bd81' AND file:hashes.SHA256 = 'ae9457c1f954f6c53914a46c15c906e542a01b830bbddd61fc64ca76e13e4d09']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--40779d2d-1039-423f-a494-825d7952460d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:49.000Z",
"modified": "2018-03-13T13:44:49.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ae9457c1f954f6c53914a46c15c906e542a01b830bbddd61fc64ca76e13e4d09/analysis/1520440445/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5d1-8840-4eea-bcc8-418102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5d1-8848-40df-9b9b-41ab02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:34:05",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5d1-b5f8-429b-bc6d-4cfc02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e77be68c-627e-49ae-97d4-e0905966779f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:52.000Z",
"modified": "2018-03-13T13:44:52.000Z",
"pattern": "[file:hashes.MD5 = 'f9b1cf4db2a9b022bfea3413dfdff615' AND file:hashes.SHA1 = 'c85e9fa793df5a67cce72a49aae59e9bc5679560' AND file:hashes.SHA256 = '538da0b115ebfa2e0b8d80f0dcfaf464afeff8f7dacb8d2db0d5938473704f64']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e15aae65-2ce2-4bf1-bf9b-bf0b5f6a4b42",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:51.000Z",
"modified": "2018-03-13T13:44:51.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/538da0b115ebfa2e0b8d80f0dcfaf464afeff8f7dacb8d2db0d5938473704f64/analysis/1520438676/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5d3-b4dc-473a-99f2-457602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5d3-c978-47e5-a251-4b9a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:04:36",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5d3-0178-4bc8-829c-436402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4d96769c-72ab-4627-b0d4-d0340cd5afb8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:55.000Z",
"modified": "2018-03-13T13:44:55.000Z",
"pattern": "[file:hashes.MD5 = '83965965da88067b506b2b16a9b84986' AND file:hashes.SHA1 = 'c46a4d1c96c0a5ab3621e7701c0321d244f10b69' AND file:hashes.SHA256 = '243b07e5f9880d126932a65ec2db49adef323b87a36ff91e6d2f811add6601d9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6a64e291-db27-4ab7-a4f1-d219c2d4a213",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:53.000Z",
"modified": "2018-03-13T13:44:53.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/243b07e5f9880d126932a65ec2db49adef323b87a36ff91e6d2f811add6601d9/analysis/1520488421/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5d5-80bc-48ac-9ceb-4fd102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5d6-aa78-47f7-9efc-40bb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:53:41",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5d6-6b8c-4eb4-bd98-4c6402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--03ca8515-5a71-4777-af1a-d1ff1d6e5a8c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:57.000Z",
"modified": "2018-03-13T13:44:57.000Z",
"pattern": "[file:hashes.MD5 = '29ed5ffc729dc63f592d1b52fc987b7c' AND file:hashes.SHA1 = 'fb0595fae19be7710fef180425841699ac595559' AND file:hashes.SHA256 = 'b9c1901743e8ca362a8efb77f1fb895e924c3e8abc5161f2bb44182a0c12523c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0adc6624-4217-4fff-8afc-70515da5eb04",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:55.000Z",
"modified": "2018-03-13T13:44:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b9c1901743e8ca362a8efb77f1fb895e924c3e8abc5161f2bb44182a0c12523c/analysis/1519371390/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5d7-0780-4ef2-b1db-499f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5d8-5898-49b0-9c31-4f5402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-23 07:36:30",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5d8-1800-47a6-92d9-465402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b842ab6c-0657-4c07-b5d6-7d84cddd0db5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:59.000Z",
"modified": "2018-03-13T13:44:59.000Z",
"pattern": "[file:hashes.MD5 = 'd4b6fc64a83cde8f4a8f58dadae2652e' AND file:hashes.SHA1 = 'd9ca71ac2e1074c9a7321d9d07a0f007ee74b860' AND file:hashes.SHA256 = 'eecfcd71ce7ec89f8d1b642c80106db2ccae5721bf88148031ce077a93172068']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:44:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--41092416-53fd-4ebc-9dd7-c561b27c71d3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:44:58.000Z",
"modified": "2018-03-13T13:44:58.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/eecfcd71ce7ec89f8d1b642c80106db2ccae5721bf88148031ce077a93172068/analysis/1519360639/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5da-eda0-428e-825d-4bea02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5da-4f30-4aa4-97ce-4b0e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-23 04:37:19",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5da-bc88-4775-8607-4d3902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--501eb9d3-d927-4981-9a70-029446f915cc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:02.000Z",
"modified": "2018-03-13T13:45:02.000Z",
"pattern": "[file:hashes.MD5 = '6fecc17a139cf30c235f5d6e4b1b19e2' AND file:hashes.SHA1 = 'ee41391ce88ba4b7fc2db49f381d9a334c9fda53' AND file:hashes.SHA256 = '0b2428609aabb06f4379d5cd50e696147f824f4c7724e826064abe9368f5c76d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f7f485cf-39d2-496d-8559-26ac32cf9a49",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:00.000Z",
"modified": "2018-03-13T13:45:00.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0b2428609aabb06f4379d5cd50e696147f824f4c7724e826064abe9368f5c76d/analysis/1520868661/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5dc-774c-47de-a5bd-400402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5dc-5670-4afb-9404-4bcb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 15:31:01",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5dd-cfa0-4afc-89d5-44be02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--471a7dbf-92c0-465f-ba18-05dfb063b09e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:04.000Z",
"modified": "2018-03-13T13:45:04.000Z",
"pattern": "[file:hashes.MD5 = '870611cf4fecc8326dda13d9d754f018' AND file:hashes.SHA1 = 'a22f432f0b37848bbae4a50b269fe5abe2d29ab1' AND file:hashes.SHA256 = '3faa0bf985680899b7ceeb5d9e8e502c1d65a113afd677d41b9f33447e46de83']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--df430360-e730-4f9f-bc3e-686429c7583a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:03.000Z",
"modified": "2018-03-13T13:45:03.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3faa0bf985680899b7ceeb5d9e8e502c1d65a113afd677d41b9f33447e46de83/analysis/1520438249/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5df-0054-448f-b8f7-4f4e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5df-71ac-43b1-a766-423a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:57:29",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5df-04b8-4e95-8d17-4daa02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f01594da-861d-4f87-b396-47514fa8363b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:07.000Z",
"modified": "2018-03-13T13:45:07.000Z",
"pattern": "[file:hashes.MD5 = '15799b9275cd8f1ee781a1807ffa1965' AND file:hashes.SHA1 = '8542537a418d2f5a89a32ebd7f21e6f55c2186a8' AND file:hashes.SHA256 = '30ecdc16bf9d416a2729d20b1bc2da466e58512f501395484828ef3446a43686']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0b79ea19-b0d7-40b9-8776-a2a016033403",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:05.000Z",
"modified": "2018-03-13T13:45:05.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/30ecdc16bf9d416a2729d20b1bc2da466e58512f501395484828ef3446a43686/analysis/1520446300/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5e1-fe4c-4e86-bc30-4fc702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5e1-32f0-415b-95a0-46b402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 18:11:40",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5e2-904c-45b9-bf3e-451902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dfa0759a-c600-44e9-9876-9917c0a250b4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:09.000Z",
"modified": "2018-03-13T13:45:09.000Z",
"pattern": "[file:hashes.MD5 = 'b59b442d0a9647f25063cf275e0bd7fd' AND file:hashes.SHA1 = '24f5559e152b8e2761c5a5a35a87b73cad34584c' AND file:hashes.SHA256 = '82903f14bcd5821f6b0f2682b1e0d32c77c760812b23811da0f1a3003917037a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5839cd4b-1637-4bb9-bb4f-d47ebed941c9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:08.000Z",
"modified": "2018-03-13T13:45:08.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/82903f14bcd5821f6b0f2682b1e0d32c77c760812b23811da0f1a3003917037a/analysis/1520376450/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5e4-a7d0-451b-8a7a-499402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5e4-0594-4a31-82ec-481c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:30",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5e4-d264-4fe4-9325-4a8f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6b548802-ebdb-43a5-9401-d2f8f3028d08",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:12.000Z",
"modified": "2018-03-13T13:45:12.000Z",
"pattern": "[file:hashes.MD5 = '735eed3bd45110f9bc21dfb3bf3406a8' AND file:hashes.SHA1 = '296d79ab15c935818b5689d42da022803c8fd045' AND file:hashes.SHA256 = 'f03677848e924269e0c8f357ad56e96fb7d0875b6aef434779594e5fbeacb2aa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4d3b0767-ca9c-4a59-b2b6-6b5d45774032",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:10.000Z",
"modified": "2018-03-13T13:45:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f03677848e924269e0c8f357ad56e96fb7d0875b6aef434779594e5fbeacb2aa/analysis/1520874053/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5e6-af9c-495f-b16a-429c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5e6-b8d0-47b4-8a52-4d2d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 17:00:53",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5e6-6358-475b-a4f6-4f2102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bb56a8a6-e4d3-42d0-833f-e4361b54331a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:14.000Z",
"modified": "2018-03-13T13:45:14.000Z",
"pattern": "[file:hashes.MD5 = '402496b36984ba7d4f384e6d37f29e2f' AND file:hashes.SHA1 = 'bf781f9ca6bf84691af81afe2377f3e953dc6c98' AND file:hashes.SHA256 = 'cce6c0a11c9c10efbe0b7b6f5d8ca6150886188dc748c1d372358bd4e62cc720']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4d05714f-a5ef-4d4f-a006-8f30c4f980b6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:12.000Z",
"modified": "2018-03-13T13:45:12.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cce6c0a11c9c10efbe0b7b6f5d8ca6150886188dc748c1d372358bd4e62cc720/analysis/1517681763/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5e8-d78c-48dd-a748-40ba02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "21/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5e9-5c44-4d25-b17b-43da02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-03 18:16:03",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5e9-4894-4cfe-a3b3-490e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1830e8c1-fd3c-4bf3-a1c8-62552d336b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:16.000Z",
"modified": "2018-03-13T13:45:16.000Z",
"pattern": "[file:hashes.MD5 = 'edcb262923c5d492034f6db5dba88cc5' AND file:hashes.SHA1 = '49db9d14abe36ce23a24209eb3070038a6714e65' AND file:hashes.SHA256 = 'e15200f16ce6d15b4405184bd6fb3889731ba3de306844f76913113e26146cf2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8dc0fa9d-8101-4cfa-a7ca-708ad1e8641b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:14.000Z",
"modified": "2018-03-13T13:45:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e15200f16ce6d15b4405184bd6fb3889731ba3de306844f76913113e26146cf2/analysis/1518701871/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5ea-abb8-40a6-a475-433002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5eb-8868-4455-a976-432f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-15 13:37:51",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5eb-5b4c-4727-9b8d-48da02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0f99173c-5e8d-4184-9112-90283901d5a7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:18.000Z",
"modified": "2018-03-13T13:45:18.000Z",
"pattern": "[file:hashes.MD5 = '6f02c3e46ba6bb331b9563eedb9a5d78' AND file:hashes.SHA1 = 'eaa72fe1c6c5d399040ef56e4aefb566de786815' AND file:hashes.SHA256 = '238ea3cc12020ad483279d363de6755d96a1fb2347b7d1815bb581514f2e9d9e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8f9ecfd9-d95a-4499-b479-443b63588110",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:17.000Z",
"modified": "2018-03-13T13:45:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/238ea3cc12020ad483279d363de6755d96a1fb2347b7d1815bb581514f2e9d9e/analysis/1520437712/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5ed-7fe8-4e73-b0bf-413b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5ed-712c-428a-bcdf-438402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:48:32",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5ed-3d20-4853-8a41-428e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--34be655c-ccbd-4123-b790-0e89cdaed85d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:21.000Z",
"modified": "2018-03-13T13:45:21.000Z",
"pattern": "[file:hashes.MD5 = '6217b0f76209446747f02f379915acb4' AND file:hashes.SHA1 = '3a9c86ce483a1c05925f6fd602302d8015d7409b' AND file:hashes.SHA256 = 'cee3b79780438aadc98ea5b4229b754566430516e2792cc7d048fc472c4dbc79']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--86b97a0a-ae05-4885-9931-5adfba823b6e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:19.000Z",
"modified": "2018-03-13T13:45:19.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cee3b79780438aadc98ea5b4229b754566430516e2792cc7d048fc472c4dbc79/analysis/1520488393/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5ef-29c8-42fa-89c8-4b3802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/57",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5f0-d584-426e-a400-468d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:53:13",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5f0-7778-4d20-9b17-4ea002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2f9ea31a-b956-4e72-9a09-e16343cfbff6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:23.000Z",
"modified": "2018-03-13T13:45:23.000Z",
"pattern": "[file:hashes.MD5 = '7fa388ba7c63a78a82614d80177c6580' AND file:hashes.SHA1 = '91471bd59351707ba3fb3e6ffe205063b53cfe57' AND file:hashes.SHA256 = '49d2c6c0ab28cc428c3e0dba54027de788d65d635e21577172fce0670c31a3d5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c298d324-80ca-47b6-839a-8194f675280e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:21.000Z",
"modified": "2018-03-13T13:45:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/49d2c6c0ab28cc428c3e0dba54027de788d65d635e21577172fce0670c31a3d5/analysis/1520438407/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5f2-cc90-4fb0-bd00-490202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5f2-8390-4bd6-ba27-40c102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:00:07",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5f2-6268-4e54-94c0-403402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4b8152a1-9434-45eb-b87c-1e63940242d9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:25.000Z",
"modified": "2018-03-13T13:45:25.000Z",
"pattern": "[file:hashes.MD5 = 'dded59f51a5d04c60faea5fd6150661a' AND file:hashes.SHA1 = 'a73edebf73f202815466aedfb4c51bbefd217e4c' AND file:hashes.SHA256 = 'f2e0902e21abde220813e7a4ea68c7b6039e92cecf338a522739e0d03bbbca16']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3a193c9f-2212-4f1a-a4c5-4ad4c34c83c5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:24.000Z",
"modified": "2018-03-13T13:45:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f2e0902e21abde220813e7a4ea68c7b6039e92cecf338a522739e0d03bbbca16/analysis/1520441290/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5f4-2468-41e4-92f3-4ce902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5f4-8308-4470-bda7-4bb202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:48:10",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5f4-e3f8-415a-a9fe-407d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d352130-43c7-45ed-8071-f107683e85e2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:28.000Z",
"modified": "2018-03-13T13:45:28.000Z",
"pattern": "[file:hashes.MD5 = '94ec8bac411ca35917a304d48e8e6cd6' AND file:hashes.SHA1 = 'fc60bcd6b753cc65c7f3e333a7c5b3c9edd92222' AND file:hashes.SHA256 = '9a16fe595e5e8dbe0604fa4d307250e4f47a86e7793378b5df7b16891ff21bb1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--826f69c0-6353-407b-959a-6db753aa04cc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:26.000Z",
"modified": "2018-03-13T13:45:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9a16fe595e5e8dbe0604fa4d307250e4f47a86e7793378b5df7b16891ff21bb1/analysis/1520871780/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5f6-ed60-4400-9412-40b902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5f7-0b2c-4015-8681-4a9a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 16:23:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5f7-ad9c-40fa-acf7-4c3a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--20c88590-7576-4c24-9aee-62d7609cbe8f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:30.000Z",
"modified": "2018-03-13T13:45:30.000Z",
"pattern": "[file:hashes.MD5 = 'd9525d04dd6bc18c6663ef95b9f13455' AND file:hashes.SHA1 = '1f35ddfd111bbc277cafc25e9d72f368d7fd3ff5' AND file:hashes.SHA256 = '7e0ff14ecaa2ac825c2161e1e859b25e33cca421d32de1cc009863bd049e98e1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e3268eb8-ff83-4c94-a785-62496de9011d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:28.000Z",
"modified": "2018-03-13T13:45:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7e0ff14ecaa2ac825c2161e1e859b25e33cca421d32de1cc009863bd049e98e1/analysis/1520439479/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d5f8-e818-4ffb-9b06-43c802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "22/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5f9-2cec-4f9e-9f30-4fa202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:17:59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d5f9-b0a8-4f24-85ff-47dc02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b138ff77-a9a1-4c08-bafe-29b0523b4ed8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:32.000Z",
"modified": "2018-03-13T13:45:32.000Z",
"pattern": "[file:hashes.MD5 = '2d38b02e4f933a6218b01aaa92d4a44a' AND file:hashes.SHA1 = '1fab58aaf00a90b477fb1a82aeb05aff1a2adeb1' AND file:hashes.SHA256 = '4d9ea1cb63d187e1cddf0085a80944903e9e020f54cbeed5674b304ed4c664a7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--633551b4-10c9-4b6f-9016-48b408fe38a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:31.000Z",
"modified": "2018-03-13T13:45:31.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4d9ea1cb63d187e1cddf0085a80944903e9e020f54cbeed5674b304ed4c664a7/analysis/1511806876/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5fb-fcd0-47c7-8954-41cf02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5fc-a004-4518-8e1c-4a1c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-27 18:21:16",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5fc-103c-45f0-bc98-43ac02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d66b5ccd-9abd-4f3c-9568-1d70c53d9bc7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:35.000Z",
"modified": "2018-03-13T13:45:35.000Z",
"pattern": "[file:hashes.MD5 = '6a5a4e3f25eecc585aa291e4e99e3d6f' AND file:hashes.SHA1 = '94eb0cbff906043653b479a3f06a02e3d5181c25' AND file:hashes.SHA256 = 'acab9cc10a836c7b94613902e585867973984c10284a7cbabf046de205b4903e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e778b89e-a884-4832-abde-6ce011251693",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:33.000Z",
"modified": "2018-03-13T13:45:33.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/acab9cc10a836c7b94613902e585867973984c10284a7cbabf046de205b4903e/analysis/1520440390/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d5fd-ab68-4d0b-8fc3-47e602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5fe-26b8-4200-8c62-42fc02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:33:10",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d5fe-f9b4-4dc0-92b6-453c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0892831f-a928-4d72-8fce-54a4e11fb7c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:37.000Z",
"modified": "2018-03-13T13:45:37.000Z",
"pattern": "[file:hashes.MD5 = 'db72ec2a57f2c44beb5d061070e4a68b' AND file:hashes.SHA1 = 'a043c15992c164f4172d74e7a7c4c930af2e8eb6' AND file:hashes.SHA256 = '339db83eabcdaf0c4b922811e6f98b36a4d6dcccf7f03ac41e3455ca2701f754']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c1f6c155-6147-4028-ba1b-a80b9dd7ba04",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:36.000Z",
"modified": "2018-03-13T13:45:36.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/339db83eabcdaf0c4b922811e6f98b36a4d6dcccf7f03ac41e3455ca2701f754/analysis/1520913480/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d600-5bb4-451f-a822-440402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d600-57d0-46c1-b450-4ccc02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:58:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d600-f300-45a5-9d55-441602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--db1caacc-9b02-4c97-91a3-e53e3e1a06dc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:40.000Z",
"modified": "2018-03-13T13:45:40.000Z",
"pattern": "[file:hashes.MD5 = '358f49d1dd28cfcc4cec5e0478629bd4' AND file:hashes.SHA1 = 'a31ec969ea034b3cadeab4658e6704344c2536dc' AND file:hashes.SHA256 = '6ea19ff6b921be796960f5c575f4021919d69172bc4fd848d70d65eb1fe23ea4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--43e01f3e-90be-425d-8ec7-de09b4b709be",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:38.000Z",
"modified": "2018-03-13T13:45:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/6ea19ff6b921be796960f5c575f4021919d69172bc4fd848d70d65eb1fe23ea4/analysis/1517074199/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d602-7ef8-4de4-aed1-425902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d603-ff1c-4d5d-9680-41f302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-27 17:29:59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d603-c14c-4fe5-a504-42a802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--67b2d93a-98eb-4c8a-9d16-4ad49b550d26",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:42.000Z",
"modified": "2018-03-13T13:45:42.000Z",
"pattern": "[file:hashes.MD5 = '0e78e263228f83d9cda4ff038487b5ed' AND file:hashes.SHA1 = '51997034c8647d1c55e737d1dbfd645844bbb766' AND file:hashes.SHA256 = '86430ccbafcd1cc2282084bd416592756765d744cb6b78b6aedbb7de27da9ec3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3df48692-1aae-44e5-ab1d-8e3f51964c1a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:40.000Z",
"modified": "2018-03-13T13:45:40.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/86430ccbafcd1cc2282084bd416592756765d744cb6b78b6aedbb7de27da9ec3/analysis/1520912417/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d604-84a8-4784-a4c4-4a6502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d605-8568-4900-9c03-4aeb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:40:17",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d605-40b0-4117-a451-4e7302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ae30abe7-aaf5-43b8-9a86-da761337167a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:44.000Z",
"modified": "2018-03-13T13:45:44.000Z",
"pattern": "[file:hashes.MD5 = '5ed2611022f85978be9c289ce9d56d3d' AND file:hashes.SHA1 = '3433141b9185994c842e0717945073291624dfc9' AND file:hashes.SHA256 = '31ab3210c37c18a594478fcf466a7d9438d44155e4a6d0ff06e2df1f9496384c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c8abd4d3-60c6-4618-844a-b449f10e295b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:43.000Z",
"modified": "2018-03-13T13:45:43.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/31ab3210c37c18a594478fcf466a7d9438d44155e4a6d0ff06e2df1f9496384c/analysis/1519130063/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d607-bb70-4ff1-854a-4cbd02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "42/65",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d607-4034-44df-b350-4d8402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-20 12:34:23",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d607-5790-4d15-af9e-4e1002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--020da26b-fa49-4c8b-8c1f-1e9c9720417a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:47.000Z",
"modified": "2018-03-13T13:45:47.000Z",
"pattern": "[file:hashes.MD5 = '418a530d741325eee659d030ef26f991' AND file:hashes.SHA1 = 'd7b1e8e6b5a493b2449ccd978131729fa741dda1' AND file:hashes.SHA256 = 'ebed0b54c50962470c7e541ea3874b6ccf71812540edff4a06080f978900d840']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4b92ac74-45c4-4016-834b-d2bea2aa65e8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:45.000Z",
"modified": "2018-03-13T13:45:45.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ebed0b54c50962470c7e541ea3874b6ccf71812540edff4a06080f978900d840/analysis/1520441051/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d609-43d0-4d13-bd58-498c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d60a-5510-47a7-8045-496902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:44:11",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d60a-961c-4205-82fe-406d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bcfb9a53-5b69-4ac4-a2ef-18fef63ea165",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:49.000Z",
"modified": "2018-03-13T13:45:49.000Z",
"pattern": "[file:hashes.MD5 = '626a6d77d70d570ab6145d4f3383969d' AND file:hashes.SHA1 = 'd17f1912afdf34993ade09f27cd7a52f4f725cc8' AND file:hashes.SHA256 = '2be736311b9fde1539cd73b19eb742f6871e423216d66dab66e7914af52fec19']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e49d9375-8dd5-4055-89fd-07955351f316",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:47.000Z",
"modified": "2018-03-13T13:45:47.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/2be736311b9fde1539cd73b19eb742f6871e423216d66dab66e7914af52fec19/analysis/1520437847/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d60b-fe18-4432-b110-481a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d60c-19c0-460f-a212-427602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:50:47",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d60c-3d28-40e5-a6f7-410202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c008b064-faae-4e2d-b895-7a3386442500",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:51.000Z",
"modified": "2018-03-13T13:45:51.000Z",
"pattern": "[file:hashes.MD5 = '17e12614bf6f1b9cc80c1801de6a7b7d' AND file:hashes.SHA1 = 'acac5c2d464136ea0ea588a71f979bc24fdf2337' AND file:hashes.SHA256 = '1416ce19fb29b01b3e89752cd2470f9390fa76ddf6a2d54a6282e85bed7b4375']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6b181382-5e85-4d8d-8841-f7d56ba607a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:50.000Z",
"modified": "2018-03-13T13:45:50.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/1416ce19fb29b01b3e89752cd2470f9390fa76ddf6a2d54a6282e85bed7b4375/analysis/1520437524/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d60e-4fc0-4c41-b636-445c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d60e-adc4-4b10-8a9d-410202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:45:24",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d60e-8660-48c4-a8dd-4e4f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a1d90f3c-1df4-47d6-a972-60df22e745d9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:53.000Z",
"modified": "2018-03-13T13:45:53.000Z",
"pattern": "[file:hashes.MD5 = 'd4c70ce66f7597919e55943b42daea6b' AND file:hashes.SHA1 = 'bef6752b727d35b34e4786cde064ff8ef2c37a53' AND file:hashes.SHA256 = '741a68002907eb05a140dd4b1000b09f9ea9f0a9ccd6928e124db0e7c535b5bc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6477d441-4a92-4916-acd4-43b19d16a375",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:52.000Z",
"modified": "2018-03-13T13:45:52.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/741a68002907eb05a140dd4b1000b09f9ea9f0a9ccd6928e124db0e7c535b5bc/analysis/1520439269/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d610-79b0-4624-8668-4d8302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d611-bf98-48c0-aa94-4a7702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:14:29",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d611-f4d8-4391-ae4e-4ea902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83c71c43-77bc-4dc1-9ac8-164993129370",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:56.000Z",
"modified": "2018-03-13T13:45:56.000Z",
"pattern": "[file:hashes.MD5 = '56306399306bc0278db0c32af922340e' AND file:hashes.SHA1 = '13742ab82eec577264e3f8c8c4ffa5719b7165f6' AND file:hashes.SHA256 = '18a10852b14df97b69243b38b23a573cc89d7629115ee0fefbbd66a00078ea4f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1e276f55-5833-4810-8bfc-bbf15fb87297",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:54.000Z",
"modified": "2018-03-13T13:45:54.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/18a10852b14df97b69243b38b23a573cc89d7629115ee0fefbbd66a00078ea4f/analysis/1513339772/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d612-6bec-48ec-b78a-4d5d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d613-17e0-43d1-a44c-432802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-15 12:09:32",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d613-cb68-489d-8622-4ac402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d66b49cb-0f4e-4fcb-8233-a006348455ee",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:58.000Z",
"modified": "2018-03-13T13:45:58.000Z",
"pattern": "[file:hashes.MD5 = '042dd0153da8b68629094e4695aa74d2' AND file:hashes.SHA1 = '48bea9e851b074105745080eafeae56ee77137e5' AND file:hashes.SHA256 = '31ac22dc5ed4f7245e3988d096ce8c78e8d8edb95ea83d419bfc5c0d6dcb8cfb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:45:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b7668932-8d26-4ac2-af13-2ed08885bcd6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:56.000Z",
"modified": "2018-03-13T13:45:56.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/31ac22dc5ed4f7245e3988d096ce8c78e8d8edb95ea83d419bfc5c0d6dcb8cfb/analysis/1520585313/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d615-7cf0-4102-a146-412502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "22/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d615-54d8-4aac-9ad6-468002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-09 08:48:33",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d615-f030-450d-b520-4bb702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e9d100a3-05ab-49d1-b1c9-0e8f2383befa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:00.000Z",
"modified": "2018-03-13T13:46:00.000Z",
"pattern": "[file:hashes.MD5 = '956b708fbf82afa013e4e8ee31b0e5ac' AND file:hashes.SHA1 = '573f10925e7626d8e54fd9240b434e43cb906603' AND file:hashes.SHA256 = '7ae9929902023ab4458ec482e9a5cb701e68862b2a1168fba6fa8b6a3e784866']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b35d1dc0-4300-4cc1-902a-5d9b046400df",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:45:59.000Z",
"modified": "2018-03-13T13:45:59.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7ae9929902023ab4458ec482e9a5cb701e68862b2a1168fba6fa8b6a3e784866/analysis/1520852520/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d617-ed7c-4ac5-b5cc-496502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d617-c310-43c3-b76e-434302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 11:02:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d617-01e8-4a77-951e-455602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fe995598-bd9e-409f-8ea4-c08712c1b9de",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:02.000Z",
"modified": "2018-03-13T13:46:02.000Z",
"pattern": "[file:hashes.MD5 = '9c6c68f27bb9c2d83d75ae9aae8565c9' AND file:hashes.SHA1 = '4b6dcb1fecaa1058b61ab9e43fd57ffce16bd5ff' AND file:hashes.SHA256 = '123fcc8bc29c954002a10a992633d143f0496bf7b942bef6741aae761cc9667c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--10484feb-f108-437b-9229-acfc6b10217a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:01.000Z",
"modified": "2018-03-13T13:46:01.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/123fcc8bc29c954002a10a992633d143f0496bf7b942bef6741aae761cc9667c/analysis/1520437445/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d619-5534-4a7d-a772-453a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d619-c530-42da-adf9-4bfb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:44:05",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d619-4678-4824-a518-456902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ed1c5751-bee4-4a8c-97d2-a0073741bbe5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:05.000Z",
"modified": "2018-03-13T13:46:05.000Z",
"pattern": "[file:hashes.MD5 = 'b220c0e88b353e74bb1ecaa118fe77de' AND file:hashes.SHA1 = '1f3289c1d072dc5759cfbeb46ae4a09dc3e7dda2' AND file:hashes.SHA256 = '1e8d3218fc242a82f105bdd1af3e5e6cc6865be66241914d0d51b332c71298f4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--72f27ad6-4f8e-4276-b7fd-287b9d809f48",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:03.000Z",
"modified": "2018-03-13T13:46:03.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/1e8d3218fc242a82f105bdd1af3e5e6cc6865be66241914d0d51b332c71298f4/analysis/1520437604/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d61b-c75c-4ce6-89f0-40ad02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d61c-7be0-451e-a269-4f3902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:46:44",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d61c-6e30-4169-b71d-4c3d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--42a8a23c-9b54-4482-8a50-046820505d98",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:07.000Z",
"modified": "2018-03-13T13:46:07.000Z",
"pattern": "[file:hashes.MD5 = '818c52a7dc1d480fc4268255d7e5360c' AND file:hashes.SHA1 = '9f47fb8cc840e4ba3d84ea25854dc122ef58e949' AND file:hashes.SHA256 = '17cf8baece726646732d14c54c565bb27c941145d10803809ade30280634e24a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5fb36872-a865-41f8-bb2c-3aa9e2706869",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:06.000Z",
"modified": "2018-03-13T13:46:06.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/17cf8baece726646732d14c54c565bb27c941145d10803809ade30280634e24a/analysis/1520437551/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d61e-03c0-4bc7-aa1e-4c2902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d61e-da44-458b-8d48-446302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:45:51",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d61e-b960-4149-b203-48bc02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7ed9d6ef-d823-437d-8281-4c9949d2b6b0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:10.000Z",
"modified": "2018-03-13T13:46:10.000Z",
"pattern": "[file:hashes.MD5 = 'f95babdf71bcb4e5b199a72b16d1b4da' AND file:hashes.SHA1 = '104041242626fb8f6138d88c0e8a673e3942f102' AND file:hashes.SHA256 = 'ddd0869bbe3586a18e728396fa3e77bdd794f4cf86584d92e0d6796d02672f68']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7f6d2249-26cc-4a41-8db2-19b133559d95",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:08.000Z",
"modified": "2018-03-13T13:46:08.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ddd0869bbe3586a18e728396fa3e77bdd794f4cf86584d92e0d6796d02672f68/analysis/1519331035/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d620-c1b0-45fa-a279-41f402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d620-2440-4471-b00c-47bc02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-22 20:23:55",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d620-7504-4fa6-9d43-4ebe02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9495bd5e-39d9-40da-951a-008a0f307829",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:12.000Z",
"modified": "2018-03-13T13:46:12.000Z",
"pattern": "[file:hashes.MD5 = '063c4967213a893249516d86de90a0b9' AND file:hashes.SHA1 = '43dc4755df874b3ff6af1d30162ef8930e44a0e7' AND file:hashes.SHA256 = 'd2a74a18a10e03fa27fbd7f954befa11ae39688e9380cfa6ea5edc7c5f2fe02a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7a0ea506-37ef-4646-97d7-5574970b30b6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:10.000Z",
"modified": "2018-03-13T13:46:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d2a74a18a10e03fa27fbd7f954befa11ae39688e9380cfa6ea5edc7c5f2fe02a/analysis/1513889377/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d622-2774-4542-9b27-45ac02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "45/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d623-a144-4de9-aee2-49bb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-21 20:49:37",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d623-26b4-4a8e-99dd-406302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2f57ac50-c7c9-4a20-b794-a714dc18fd80",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:14.000Z",
"modified": "2018-03-13T13:46:14.000Z",
"pattern": "[file:hashes.MD5 = '205720c215a3620830a6d03eca23fa56' AND file:hashes.SHA1 = 'e2483d6ab38718d649d00b4a9f53366e93012f0f' AND file:hashes.SHA256 = '29e66d89af2621339273b64b45014e661710361591c514b950092be82e5222ba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--43401fe1-3ad8-4d5e-ae34-03c4e6b1187b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:12.000Z",
"modified": "2018-03-13T13:46:12.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/29e66d89af2621339273b64b45014e661710361591c514b950092be82e5222ba/analysis/1520437821/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d624-2ba4-4a7a-ada5-471d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d626-d280-4e60-b798-448f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:50:21",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d626-0498-4ba2-9303-42ce02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--174ec337-9a50-4f85-8127-3a95078ecd00",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:17.000Z",
"modified": "2018-03-13T13:46:17.000Z",
"pattern": "[file:hashes.MD5 = '147b20ddc572866fe34695b79fb70047' AND file:hashes.SHA1 = 'b5c236c5040ecf8c24a09c47ae73307953fc130f' AND file:hashes.SHA256 = 'ae81c89e16a9e3fbff5b2054441c090afdf659470127b79f9662a5a12732049c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9e6aba26-4bc6-4749-9af1-5e33710786ba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:16.000Z",
"modified": "2018-03-13T13:46:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ae81c89e16a9e3fbff5b2054441c090afdf659470127b79f9662a5a12732049c/analysis/1520376465/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d628-8770-46b3-8da8-43d602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d628-d988-411b-b04c-41ca02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:45",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d628-130c-4587-8f45-479102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d60d4a1a-e213-4e2a-a245-02347da28512",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:19.000Z",
"modified": "2018-03-13T13:46:19.000Z",
"pattern": "[file:hashes.MD5 = '9845ccaaf3c4fe109bda24adc6b93dbf' AND file:hashes.SHA1 = 'd229149bc19716ec4edaf3be9929706116953cc0' AND file:hashes.SHA256 = 'eafc44e91530127b5ac46763dc14015963b77c2c52846ec7da42c50ecbaabb54']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--87acea24-f544-414b-9337-4aa282031caa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:18.000Z",
"modified": "2018-03-13T13:46:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/eafc44e91530127b5ac46763dc14015963b77c2c52846ec7da42c50ecbaabb54/analysis/1520441024/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d62a-c1d0-4fb9-8bcd-4d6002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d62a-3434-4391-b216-408e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:43:44",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d62a-2f10-44d9-953d-4a2002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7f797fe4-795e-4152-94a5-ca85ad81e2e9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:22.000Z",
"modified": "2018-03-13T13:46:22.000Z",
"pattern": "[file:hashes.MD5 = '0d4c1fc61258263a829d21e99affc6cd' AND file:hashes.SHA1 = '31b6714de2f8087067c2454d72b91c72dc8c0562' AND file:hashes.SHA256 = 'fa9beaf7e8eb887f46ed584d2bb5b79f3c0fe5d57d6a5aecbdc7f6093c316eb8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0df2e9df-4106-48f7-9f4f-6bf91b431e11",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:20.000Z",
"modified": "2018-03-13T13:46:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/fa9beaf7e8eb887f46ed584d2bb5b79f3c0fe5d57d6a5aecbdc7f6093c316eb8/analysis/1518615635/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d62c-53e8-4dae-b4e5-408e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d62c-f948-48f3-a2da-48b402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-14 13:40:35",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d62c-bdec-457d-a260-4cdd02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--46998b72-d9b5-4392-868d-0c843d34fc00",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:24.000Z",
"modified": "2018-03-13T13:46:24.000Z",
"pattern": "[file:hashes.MD5 = 'c1bf4051aaf7f5b78d5825c333769c3f' AND file:hashes.SHA1 = '2c61002849ee203cc068f5360875096a2c14fb60' AND file:hashes.SHA256 = 'baf336f2048ed4de6b342d4cdf8b6ca4a95cf83167c2f2c044c12fd85923ed87']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f98f0864-6f07-45b0-b0f4-0c88c07dffb0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:22.000Z",
"modified": "2018-03-13T13:46:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/baf336f2048ed4de6b342d4cdf8b6ca4a95cf83167c2f2c044c12fd85923ed87/analysis/1520440788/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d62e-a060-4d40-8d47-419302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d62f-f8a8-4bd9-becb-483302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:39:48",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d62f-9828-49bf-a448-481302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--80685b00-a882-4132-9551-286ab3b430c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:26.000Z",
"modified": "2018-03-13T13:46:26.000Z",
"pattern": "[file:hashes.MD5 = 'b06572a6b4f3261b6cf355225b7d139c' AND file:hashes.SHA1 = '7873067b2442d577078d6bba33838e750dd422ef' AND file:hashes.SHA256 = 'f6546f3a9fb403743f9ab72ed5c8e9cc63f26bc65f4fbd7139e4adbb12e854b8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bbdca7b6-37ed-4ae2-aace-f71b4c8ac0c0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:24.000Z",
"modified": "2018-03-13T13:46:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f6546f3a9fb403743f9ab72ed5c8e9cc63f26bc65f4fbd7139e4adbb12e854b8/analysis/1520851560/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d630-1990-4b64-8765-436602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d631-2720-422b-b831-48f602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 10:46:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d631-cf5c-4ac1-9123-44a902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2f15384f-e5ea-4e02-851b-9ecbf3508149",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:28.000Z",
"modified": "2018-03-13T13:46:28.000Z",
"pattern": "[file:hashes.MD5 = '1ccf78d8a3a539c1fc9e599ebb49ed78' AND file:hashes.SHA1 = '1b2e9fd7a60ca82fdb5575d85fa8659f5c64f9fe' AND file:hashes.SHA256 = '610e32c6dbf24f80c6a20648a139b06ee9ef255178feb8c788e29bced4016443']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f1bdcb12-3b65-4f80-8ee4-063b9b5b66f7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:27.000Z",
"modified": "2018-03-13T13:46:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/610e32c6dbf24f80c6a20648a139b06ee9ef255178feb8c788e29bced4016443/analysis/1520904300/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d633-363c-4c85-ab4d-4d5c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d633-4ba0-4927-9e16-43fc02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 01:25:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d633-3ebc-4339-8d61-401402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b0031ea-445e-4619-98be-8c0059ec1b62",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:31.000Z",
"modified": "2018-03-13T13:46:31.000Z",
"pattern": "[file:hashes.MD5 = '16842e774adef1ac9aae92acfb7c21a2' AND file:hashes.SHA1 = 'a93ac88b5d7a9743ad53b6744b62a326f0fe3926' AND file:hashes.SHA256 = 'a95b7e80425bee413ac5a022bca996ad0cd2bd18ed5db7fbe6c0769c5399a163']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3bbcd9ed-3e47-470c-b431-e70443010365",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:29.000Z",
"modified": "2018-03-13T13:46:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a95b7e80425bee413ac5a022bca996ad0cd2bd18ed5db7fbe6c0769c5399a163/analysis/1513105466/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d635-d2c4-48e0-b3b4-442702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "53/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d635-2374-48fc-968c-4dc902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-12 19:04:26",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d636-42c8-4dbf-a851-4a3e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9a1ed464-4795-470b-820d-77ebba0fd9de",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:33.000Z",
"modified": "2018-03-13T13:46:33.000Z",
"pattern": "[file:hashes.MD5 = 'f742d92e42d813aa45c995203a423f90' AND file:hashes.SHA1 = '1dea7d6f21622f3fc0a5385dcbd6268e89dc2273' AND file:hashes.SHA256 = '7aeeb897d0c1de47500ea23b65a2266e7239f2b061ef4aa8989164a4e99e94bc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8e4dd566-7edf-49a9-8dc7-294cd59c3b80",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:31.000Z",
"modified": "2018-03-13T13:46:31.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7aeeb897d0c1de47500ea23b65a2266e7239f2b061ef4aa8989164a4e99e94bc/analysis/1520913602/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d637-7f08-43c8-b11e-418602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d638-9e20-47b7-b2af-49c302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 04:00:02",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d638-0e14-4315-8d90-406502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--436515ee-125b-445a-b9bd-0326cc980910",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:35.000Z",
"modified": "2018-03-13T13:46:35.000Z",
"pattern": "[file:hashes.MD5 = 'b0d0b281554f8fbe9f6af749a0bd9239' AND file:hashes.SHA1 = '5be7b445857ba4091ca81b768dba7e09698fce76' AND file:hashes.SHA256 = 'ebf4d1f9396d6ab1aff5b3cc6c8e682e1291c49bbbe51ac5c797dc252833909f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7b789516-52af-42e3-a4d8-402725bebbad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:33.000Z",
"modified": "2018-03-13T13:46:33.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ebf4d1f9396d6ab1aff5b3cc6c8e682e1291c49bbbe51ac5c797dc252833909f/analysis/1514997355/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d63a-8bf8-401d-a221-4be202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d63a-f360-4cbf-98cc-459c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 16:35:55",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d63a-1a98-4876-9a10-4ab002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c18d5005-8d30-4b08-8b79-5471964d2686",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:37.000Z",
"modified": "2018-03-13T13:46:37.000Z",
"pattern": "[file:hashes.MD5 = '2f3ee38a8d58a817e71a10290fd395d3' AND file:hashes.SHA1 = 'c824572107a9f2ffd7af7d261a493d1f11f6e950' AND file:hashes.SHA256 = '5f654112de0cafea313816ab3ef06818b438997b94fc28cb62474c17a3426f4c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--aad037d0-ccc1-42ad-9e22-b00255d02d6b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:36.000Z",
"modified": "2018-03-13T13:46:36.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5f654112de0cafea313816ab3ef06818b438997b94fc28cb62474c17a3426f4c/analysis/1520438860/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d63c-a0b0-4420-964f-4fd202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d63c-b25c-47ce-afad-476602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:07:40",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d63c-b454-4e47-ad6c-4fe002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f21c8928-a0ce-47df-af6d-1dc4800e6684",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:40.000Z",
"modified": "2018-03-13T13:46:40.000Z",
"pattern": "[file:hashes.MD5 = 'd1a46675e3a0e0cfc0d32befa3e78219' AND file:hashes.SHA1 = 'ecc8aaedf0042bb42fb2eb1ad3c718c340de2ae0' AND file:hashes.SHA256 = 'b7475b1e27ee13d5ca7a59186fd6621bda2632910a2c4bf3117acf4e441b9b94']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--092b2e56-e71f-407e-ae75-1048d5d294aa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:38.000Z",
"modified": "2018-03-13T13:46:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b7475b1e27ee13d5ca7a59186fd6621bda2632910a2c4bf3117acf4e441b9b94/analysis/1520855460/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d63e-ef54-4c9d-a609-420902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d63f-9cfc-41b5-9334-47c302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 11:51:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d63f-06b0-4e3c-a071-4ac002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--26ed6d13-7ede-45a0-9d75-8484cbe26f82",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:42.000Z",
"modified": "2018-03-13T13:46:42.000Z",
"pattern": "[file:hashes.MD5 = 'a638f383936817b70f03d98f393874a2' AND file:hashes.SHA1 = '91928391f226f482f876e3ff46e68cee34ba7724' AND file:hashes.SHA256 = '1770d63f6ca452aa3afe77690c956fbbb0d5ae186fc82c0d14730820f9b7bb6c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3bc35d8c-6cd4-4946-bde4-deae4dae2192",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:41.000Z",
"modified": "2018-03-13T13:46:41.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/1770d63f6ca452aa3afe77690c956fbbb0d5ae186fc82c0d14730820f9b7bb6c/analysis/1520919064/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d641-4784-46d2-9332-408502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "61/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d641-e860-4a62-b0a1-444c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 05:31:04",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d641-0858-402c-bdce-4d0f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a378e561-df52-488b-8b61-9c31848fd405",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:44.000Z",
"modified": "2018-03-13T13:46:44.000Z",
"pattern": "[file:hashes.MD5 = '18072a813d847b2c4e2d6cab4646fc2e' AND file:hashes.SHA1 = '2d5270e9236ad433cee634eee8b36f8aa9591ecf' AND file:hashes.SHA256 = '86b826543a4e343cf2ecc8f8279b859aadf5034a25613d30eb13d8f4f1d8cd57']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5d9c9579-9bac-42fe-b4d7-d2c99c2e7f26",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:43.000Z",
"modified": "2018-03-13T13:46:43.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/86b826543a4e343cf2ecc8f8279b859aadf5034a25613d30eb13d8f4f1d8cd57/analysis/1519924151/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d643-c5b4-4743-bdfe-458f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d643-7c30-43f2-92bc-43df02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-01 17:09:11",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d643-6ec4-4d32-b141-4d0a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1fc063d9-da6f-49e5-9aec-04541560882f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:47.000Z",
"modified": "2018-03-13T13:46:47.000Z",
"pattern": "[file:hashes.MD5 = 'ca993e621abb242da648fef55fa0c4ed' AND file:hashes.SHA1 = 'cb673ead682f7eaffaeb369cd9105cb3f03b5414' AND file:hashes.SHA256 = '4fbecaa6c190937aac19adc6ec5599a7056305ffebe65015e22da2a324c7c114']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c66e9d99-b3ee-4276-9bc4-e16197dc1343",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:45.000Z",
"modified": "2018-03-13T13:46:45.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4fbecaa6c190937aac19adc6ec5599a7056305ffebe65015e22da2a324c7c114/analysis/1520376437/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d645-45e4-4ce1-b960-450a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d645-0de4-4d29-b4ac-4f5202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:17",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d645-a0dc-4ece-a7af-49dc02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a2d020e6-f709-4ed7-9c48-90d666c9f95b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:49.000Z",
"modified": "2018-03-13T13:46:49.000Z",
"pattern": "[file:hashes.MD5 = '04fede85e14161a16a28dc7fa89c248f' AND file:hashes.SHA1 = '44cfc28a5efecd154f7fed76bc8751af232f0815' AND file:hashes.SHA256 = '924b32b407b44c7ff6788004120cd85d410648a04cd6f5360db3e199e6c82a04']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--164fe582-c64d-4e47-ae0d-a7dcd9ee6410",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:47.000Z",
"modified": "2018-03-13T13:46:47.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/924b32b407b44c7ff6788004120cd85d410648a04cd6f5360db3e199e6c82a04/analysis/1520440017/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d647-73a0-49e8-8fa1-49a502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "42/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d648-15d4-4af3-80fd-458802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:26:57",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d648-a5c0-47d4-b962-45af02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d012ed78-ce5b-4169-9631-e80bd8e8f78e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:51.000Z",
"modified": "2018-03-13T13:46:51.000Z",
"pattern": "[file:hashes.MD5 = '3d9f55e878c149ef34e09b9f25f88de6' AND file:hashes.SHA1 = 'f1d79033bbf89e66a196af626ff881f7e874ce84' AND file:hashes.SHA256 = '0accb1cd97ab92a9b4b8829a36e081ba8c5ab8944928d79502aff2f141dd999c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--039c4cb6-78a0-4ee5-89c2-4e3fbb5d9db8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:50.000Z",
"modified": "2018-03-13T13:46:50.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0accb1cd97ab92a9b4b8829a36e081ba8c5ab8944928d79502aff2f141dd999c/analysis/1520376417/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d64a-dae0-40b3-9a09-469b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d64b-2294-4593-959c-466a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:46:57",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d64b-7d98-474a-94fd-4a1302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0892f76-ec4f-4948-b54f-a7e56ee990ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:54.000Z",
"modified": "2018-03-13T13:46:54.000Z",
"pattern": "[file:hashes.MD5 = '00f542f2bf878c1c3a48c6bcde52c53f' AND file:hashes.SHA1 = '83664d54acb330ca53562c191a22780cab6ffbec' AND file:hashes.SHA256 = 'de1499522ca82e52c9b05fc00254634191de681a19b80be5823bbf38df0f569f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--90685d7c-a0d2-4413-894e-7c1d95f10924",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:52.000Z",
"modified": "2018-03-13T13:46:52.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/de1499522ca82e52c9b05fc00254634191de681a19b80be5823bbf38df0f569f/analysis/1520910780/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d64d-ecc0-4c22-8486-4e1502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d64d-0640-4a84-9b43-4f6102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:13:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d64d-d62c-4e45-900d-4ec302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e55e7446-e0ac-4f7e-b4a7-7de1d3a96e50",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:56.000Z",
"modified": "2018-03-13T13:46:56.000Z",
"pattern": "[file:hashes.MD5 = '802be047127b51467ae4300276a6f2d8' AND file:hashes.SHA1 = '1139780b91c6052cfcc2ac8f41df55855bccbef3' AND file:hashes.SHA256 = 'd5d0afc9b0697ddbf097e4704c0e4818b09a3f195b88f276b57f3e665352d7c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9c601eec-34f8-4883-ad4c-991beb9c5313",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:55.000Z",
"modified": "2018-03-13T13:46:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d5d0afc9b0697ddbf097e4704c0e4818b09a3f195b88f276b57f3e665352d7c9/analysis/1519650948/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d64f-81c8-4b4a-8e90-480802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d64f-fef8-4aea-b5dc-440a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-26 13:15:48",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d64f-0a7c-4ea0-af92-4ab802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f1bc257b-1f9f-4ffe-86be-35ffd892f3b0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:59.000Z",
"modified": "2018-03-13T13:46:59.000Z",
"pattern": "[file:hashes.MD5 = '65783e3a26527fc07f3bbe65d546383c' AND file:hashes.SHA1 = '7557fbbe757946ed3d519abd470fc951d6b2cd60' AND file:hashes.SHA256 = '9894ba3b6c110bcd9b245058f8cdd8943cb7515b53cabe7589368de005cfcbd7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:46:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c7bfc277-b689-4282-a52b-723f92964fb0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:46:57.000Z",
"modified": "2018-03-13T13:46:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9894ba3b6c110bcd9b245058f8cdd8943cb7515b53cabe7589368de005cfcbd7/analysis/1520823298/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d651-0258-4c95-b035-46cb02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d652-0700-4bf0-8080-4b7102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 02:54:58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d652-5a94-415e-b02f-452602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b9b8ff6a-80a9-40a8-aa1e-000583538507",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:01.000Z",
"modified": "2018-03-13T13:47:01.000Z",
"pattern": "[file:hashes.MD5 = 'b90d43982901803c61b3ab1132e37676' AND file:hashes.SHA1 = '8bc267785b484d54047ec8352995b3b0dd8ea85d' AND file:hashes.SHA256 = '98861a1dd370bcfee107017e75cf1d527fbe8845181042de3493d0d0e7a624ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bc28e52a-d2b1-4db5-98b2-b78814197fd0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:00.000Z",
"modified": "2018-03-13T13:47:00.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/98861a1dd370bcfee107017e75cf1d527fbe8845181042de3493d0d0e7a624ca/analysis/1520440123/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d654-f248-42e3-8aeb-444202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d654-7078-40af-8b71-4ef102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:28:43",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d655-7f50-44b5-b8e7-449902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5557a9c2-2926-4aa6-9091-3871ebd874d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:04.000Z",
"modified": "2018-03-13T13:47:04.000Z",
"pattern": "[file:hashes.MD5 = 'c2636850a5306da92d9271b33436ede9' AND file:hashes.SHA1 = '209379ab9568c30d485e98e76f221ec5a5e3b995' AND file:hashes.SHA256 = 'de9bfa660708b04c9519c9ca7d36cd5c6b9dd5b448cc0ee01b0ca846ee381965']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7888f078-6e6f-40d0-b426-fbf99c5e25ce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:02.000Z",
"modified": "2018-03-13T13:47:02.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/de9bfa660708b04c9519c9ca7d36cd5c6b9dd5b448cc0ee01b0ca846ee381965/analysis/1517620908/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d656-8c50-45c2-b4d2-4cd402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d657-aba8-4039-82e9-41d502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-03 01:21:48",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d657-336c-44c9-a26c-4eb502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d9764fb8-d509-4b1a-9b6f-434bee32f6e3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:06.000Z",
"modified": "2018-03-13T13:47:06.000Z",
"pattern": "[file:hashes.MD5 = '9b6b92395d9cf055dab9b7e66f846ee5' AND file:hashes.SHA1 = '0bf1aff8aba805b348731ed52b047aa2e0982147' AND file:hashes.SHA256 = 'ab0f7d145f178f26444e9c5b1815911131a7f6ba4b41647280320a363e626b1a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--99b98df2-668d-495e-b127-d171c1d9d3c8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:05.000Z",
"modified": "2018-03-13T13:47:05.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ab0f7d145f178f26444e9c5b1815911131a7f6ba4b41647280320a363e626b1a/analysis/1514997432/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d659-bd50-4d7e-a566-439202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d659-fb6c-46d2-a754-42bf02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 16:37:12",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d659-5488-402c-8756-454202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--64348811-02d2-43c3-a49e-65a3d4491dcb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:09.000Z",
"modified": "2018-03-13T13:47:09.000Z",
"pattern": "[file:hashes.MD5 = '32d095989392b0aa877729ca11e66e60' AND file:hashes.SHA1 = '9c3774494d1a4550276d7507aa9e77409d302b1e' AND file:hashes.SHA256 = 'ecb914fcb7ac970616768bf7ec7c8fdb27512fe0d1ae00980e6070b1226d95bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--521302dd-bf8c-4040-a8f9-026216bf0ada",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:07.000Z",
"modified": "2018-03-13T13:47:07.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ecb914fcb7ac970616768bf7ec7c8fdb27512fe0d1ae00980e6070b1226d95bb/analysis/1520913594/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d65b-d630-4b33-9f25-419002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d65c-5f98-4515-81c8-497802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:59:54",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d65c-62ac-4216-906a-4f5102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56e47645-eac8-4997-a5cf-32192544f4ea",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:11.000Z",
"modified": "2018-03-13T13:47:11.000Z",
"pattern": "[file:hashes.MD5 = '30b8e6329ff713d6146aaf182a0a3571' AND file:hashes.SHA1 = 'aaf0772395e71ac80fc4f2beb25f0f48c5354905' AND file:hashes.SHA256 = '504af6417f1d6f4307b046f70104d604b3762bacefb6f4eafedcc35a9fc7d35f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f6103ca7-a9aa-454d-be10-d6fbc27699f1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:09.000Z",
"modified": "2018-03-13T13:47:09.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/504af6417f1d6f4307b046f70104d604b3762bacefb6f4eafedcc35a9fc7d35f/analysis/1520438514/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d65d-d478-4f9f-85ed-44a802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d65e-46a8-402f-bb96-4a9502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:01:54",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d65e-6500-419b-8c2a-42ac02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--31f4b6b6-e16e-41a5-9f5f-d451220d62f3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:13.000Z",
"modified": "2018-03-13T13:47:13.000Z",
"pattern": "[file:hashes.MD5 = '3a58e1ecf150a64992b851b7142d895c' AND file:hashes.SHA1 = '4d022d61ff4b5935a67754ecf030bba117c63128' AND file:hashes.SHA256 = 'a65093c35d1647563f840e42893d09809311f34c3861c2c9db479109ee31df37']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2ae0b87d-3b07-4a7d-a8f3-280f94879967",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:12.000Z",
"modified": "2018-03-13T13:47:12.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a65093c35d1647563f840e42893d09809311f34c3861c2c9db479109ee31df37/analysis/1520418218/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d660-21cc-4ac1-a912-4d7402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d660-7ec8-4b27-8335-4e5f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 10:23:38",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d660-6a90-4472-bff5-438002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--32d62c01-a77d-4a61-91e2-e479232e89fa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:16.000Z",
"modified": "2018-03-13T13:47:16.000Z",
"pattern": "[file:hashes.MD5 = 'b7060ec29c4020b340be54997845187d' AND file:hashes.SHA1 = 'c46cbf8fb7b6066e4a9b2ffd6daf52eb1395e801' AND file:hashes.SHA256 = 'ce53701bddcc24071c55b2b02c79508276b3c69444275f994c0fe690c63b8df8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f4223054-bc53-4228-92bf-02380266e4d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:14.000Z",
"modified": "2018-03-13T13:47:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ce53701bddcc24071c55b2b02c79508276b3c69444275f994c0fe690c63b8df8/analysis/1513498581/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d662-6578-4229-9ef4-408c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d662-02c4-4e58-b5d5-418002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-17 08:16:21",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d662-3a50-432c-84e5-416502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bbeb2a80-fffe-4959-a634-6d1b92c27966",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:18.000Z",
"modified": "2018-03-13T13:47:18.000Z",
"pattern": "[file:hashes.MD5 = 'a13884ea719f3f48d7487b8fa2ca7fa9' AND file:hashes.SHA1 = 'dce99aaf64c4aae484232fdd2a58136d797b2ed6' AND file:hashes.SHA256 = '50625750d4338ad1698b2216d0b289cee2666ac5ea081b90b11859ee13c92a78']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--68c69bf0-47b9-4ea2-8531-239821114309",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:16.000Z",
"modified": "2018-03-13T13:47:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/50625750d4338ad1698b2216d0b289cee2666ac5ea081b90b11859ee13c92a78/analysis/1520438541/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d664-ca8c-400f-b284-4c4c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d665-da58-4f9f-a706-404902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:02:21",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d665-76cc-41b6-bc01-49e202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fe568963-2dc3-417b-99e1-5ad9a83f40db",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:20.000Z",
"modified": "2018-03-13T13:47:20.000Z",
"pattern": "[file:hashes.MD5 = '2da6caeb7945a29deb4d1b4d2a71d168' AND file:hashes.SHA1 = '662a6ebeec07415749c907a24ae953c67e691eed' AND file:hashes.SHA256 = '6f3ad7b311f7f052accecf3a434418e499d3f2e7cd6374c15d8d26a3f1785c01']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--df245559-1f77-4c8e-b92a-873b30f1c2d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:18.000Z",
"modified": "2018-03-13T13:47:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/6f3ad7b311f7f052accecf3a434418e499d3f2e7cd6374c15d8d26a3f1785c01/analysis/1520439081/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d667-f00c-4b16-b763-4b3802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d667-0a78-4bad-9cc4-485502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:11:21",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d667-b0e4-4d0f-a195-49bc02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--18dd827f-22e9-4c33-b517-6cbcddc95a21",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:22.000Z",
"modified": "2018-03-13T13:47:22.000Z",
"pattern": "[file:hashes.MD5 = 'f143d252ab3c1ee86aee33f3e1eb2f8b' AND file:hashes.SHA1 = '20cb638150ee953c13a391cbb6f1f0045b82b651' AND file:hashes.SHA256 = 'f323778fbfaca654f6b91124c60d81bc3fba360ff96d30f0253293760ae504a0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e6a3fa3d-87e2-45e3-af5d-d6991ae8e074",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:21.000Z",
"modified": "2018-03-13T13:47:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f323778fbfaca654f6b91124c60d81bc3fba360ff96d30f0253293760ae504a0/analysis/1520441317/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d669-722c-43be-9829-4f2402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d669-cbdc-48ac-99bc-42a802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:48:37",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d669-45f8-4b9e-a58f-4fad02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd8efd15-6af3-43ba-84c8-eac4769883cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:25.000Z",
"modified": "2018-03-13T13:47:25.000Z",
"pattern": "[file:hashes.MD5 = '2c7c44b6f5df8af5cf44ef88f9f1bad1' AND file:hashes.SHA1 = '3efb441e727c21a5bf45f3650a32aadee42bdfba' AND file:hashes.SHA256 = '041ad28cf8a6c03953910ea6dec3987ffd4daf729cce2a87e9bf68c480c0918e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--618d429f-6a91-4bba-892a-c719cf60cea3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:23.000Z",
"modified": "2018-03-13T13:47:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/041ad28cf8a6c03953910ea6dec3987ffd4daf729cce2a87e9bf68c480c0918e/analysis/1516822177/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d66b-a678-4f0d-934b-44bc02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d66c-9414-4eb6-8015-474802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-24 19:29:37",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d66c-4910-438e-9dba-4df402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--277f3ee6-3d34-4038-abcf-2499c69b02ce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:27.000Z",
"modified": "2018-03-13T13:47:27.000Z",
"pattern": "[file:hashes.MD5 = '94d2add64b1e07760e8e4d19f5990a6d' AND file:hashes.SHA1 = '2304d54247853d33128b1606929b55c2e178b947' AND file:hashes.SHA256 = '90d3cad13e03fa3a586c84deacd68bf6ae37f60ea030d1efaea5fbacc1a1e93f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f4efd30c-0621-4634-a2ec-478ab941efca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:26.000Z",
"modified": "2018-03-13T13:47:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/90d3cad13e03fa3a586c84deacd68bf6ae37f60ea030d1efaea5fbacc1a1e93f/analysis/1520908980/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d66e-075c-4f1e-b7d7-463102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/57",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d66e-00b8-4aae-9fff-48bc02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 02:43:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d66e-1e00-4d1c-a6d3-464b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9478791d-a2ed-4bbe-866c-f36e552defdd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:29.000Z",
"modified": "2018-03-13T13:47:29.000Z",
"pattern": "[file:hashes.MD5 = '0b841d3ea970f05ddf1009711d82572d' AND file:hashes.SHA1 = '0317909ce88167641bda95d27d7890afe346d0ab' AND file:hashes.SHA256 = 'dc8c82e7dd88d9d42f2872fee149eb219b537c2f21035834bed17cd205f54a51']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--837f0b81-3cbb-419b-82d8-2bb5de26578c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:28.000Z",
"modified": "2018-03-13T13:47:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/dc8c82e7dd88d9d42f2872fee149eb219b537c2f21035834bed17cd205f54a51/analysis/1510365441/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d670-3134-4dc8-a465-40de02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/56",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d670-0bb0-4c02-ae7a-465502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-11 01:57:21",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d670-b25c-4fb1-8eee-46dc02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--25ac76f6-4ab3-4d15-a4e4-4c5536e0520d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:32.000Z",
"modified": "2018-03-13T13:47:32.000Z",
"pattern": "[file:hashes.MD5 = '046c3f9b6ef9e9ea743428f2da359966' AND file:hashes.SHA1 = 'a2c531dd0692088e1afdf22b9624335f2e72b930' AND file:hashes.SHA256 = 'b41c8eb7d5907d0a13d03163cbb4114a2983c4dc00237aab00f1a632725c27a6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b8393ac2-5026-481f-82f1-db6fb4b48d28",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:30.000Z",
"modified": "2018-03-13T13:47:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b41c8eb7d5907d0a13d03163cbb4114a2983c4dc00237aab00f1a632725c27a6/analysis/1520440604/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d672-31c4-49bc-9488-43c402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d673-2f40-474e-8a67-4bcb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:36:44",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d673-5ad8-4aa6-867a-488002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1270a24c-137d-42b8-8bb2-f327d09c62d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:34.000Z",
"modified": "2018-03-13T13:47:34.000Z",
"pattern": "[file:hashes.MD5 = 'fc6e4c79d4212b5973d6a521beee65da' AND file:hashes.SHA1 = '1a80af199e8ff655881efd641fd428372eca8ad2' AND file:hashes.SHA256 = '93107f3a350dc955a632a5011f7cb274b0ca9288c2106bf6c971bbb09c0ececc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0bef6eee-e08f-4405-9ffa-7b98518e0fae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:32.000Z",
"modified": "2018-03-13T13:47:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/93107f3a350dc955a632a5011f7cb274b0ca9288c2106bf6c971bbb09c0ececc/analysis/1520488534/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d674-8400-4dcc-aa47-4f7502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d675-ede8-4d66-b706-412002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:55:34",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d675-0ed0-4f4b-bebc-428c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--44a433bd-8cfe-4150-ac8d-16ca5a4982fd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:36.000Z",
"modified": "2018-03-13T13:47:36.000Z",
"pattern": "[file:hashes.MD5 = '823dbbac6c62eb692b12729ef54d1616' AND file:hashes.SHA1 = 'fb1ea59255acc89d188ea93af3e5cb12d666772e' AND file:hashes.SHA256 = '8205524c6b5b6a395c44585fb04e835fbcdff2b0a135b210dbb281a33feb39dd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5bfacbe9-088e-452b-864b-e4e0071f5dd3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:35.000Z",
"modified": "2018-03-13T13:47:35.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8205524c6b5b6a395c44585fb04e835fbcdff2b0a135b210dbb281a33feb39dd/analysis/1520488516/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d677-6708-4574-b863-483802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d677-6994-4509-a990-4b0002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:55:16",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d677-6328-4d6e-82fa-4f0502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b80818b7-46c2-41f2-8274-9bd66c2441b3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:39.000Z",
"modified": "2018-03-13T13:47:39.000Z",
"pattern": "[file:hashes.MD5 = '35946f8fbace68696f1492f8a21db359' AND file:hashes.SHA1 = '2b02e8c314f86ec85031af3266b1c05dcbe4682a' AND file:hashes.SHA256 = '6667897650cba6e393345151f9b44e62bb5d1eb97888e4fb569d79d7fe89b873']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b55faed7-7aa6-460d-885e-2c47abff9462",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:37.000Z",
"modified": "2018-03-13T13:47:37.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/6667897650cba6e393345151f9b44e62bb5d1eb97888e4fb569d79d7fe89b873/analysis/1520913595/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d679-39e4-43a6-90d4-460902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d679-5f20-421c-9b8c-458d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:59:55",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d679-c674-4929-8e65-4eb402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b1f1d953-5872-4004-bd05-9fa658e326fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:41.000Z",
"modified": "2018-03-13T13:47:41.000Z",
"pattern": "[file:hashes.MD5 = '7ea4bef65f98165b6d04252025b0c9a5' AND file:hashes.SHA1 = '11757e130582f7b9ed748f5f870264efa2af618c' AND file:hashes.SHA256 = '9248bf0411d30d4f1616f3a2d7a055b4692c87717033a36ab630ba20ff599489']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--dd23efa6-454b-4338-82cd-ff495fb2b32c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:39.000Z",
"modified": "2018-03-13T13:47:39.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9248bf0411d30d4f1616f3a2d7a055b4692c87717033a36ab630ba20ff599489/analysis/1520841218/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d67b-20f8-412d-b676-458602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d67c-54f0-45f5-a1cf-420302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 07:53:38",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d67c-0c70-4a3e-9a8f-4aa702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a20fd02a-a3bb-45a2-9cdd-537570f9d775",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:43.000Z",
"modified": "2018-03-13T13:47:43.000Z",
"pattern": "[file:hashes.MD5 = '0d6098544b53298c86b99ce5890bb398' AND file:hashes.SHA1 = '5b90a1b7b095bc7343079fd7fece1ad80a668efa' AND file:hashes.SHA256 = 'd69a55c55cf4c831579defdc8ae640997141c577558adc07fe53d037008541e3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9dc0eda8-c956-43e1-8bc4-5c88a5da9d9e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:41.000Z",
"modified": "2018-03-13T13:47:41.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d69a55c55cf4c831579defdc8ae640997141c577558adc07fe53d037008541e3/analysis/1520376482/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d67e-fd10-418f-934f-403302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d67e-921c-4c9d-8f15-465d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:02",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d67e-22e4-4001-9c8d-43c802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2e2cb479-1811-4020-91b1-64206c1c3bf9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:45.000Z",
"modified": "2018-03-13T13:47:45.000Z",
"pattern": "[file:hashes.MD5 = '529248046e18baff274f2f4b2af5511a' AND file:hashes.SHA1 = '5cb98c290f82074db0dea23181fda62d95c333f0' AND file:hashes.SHA256 = '0e3de5470c2f6687efee85eeb7022cd304b880118fdfc23eee8761ce3374635a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a681ce5c-c6b9-4dfa-86df-b14f736d5727",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:44.000Z",
"modified": "2018-03-13T13:47:44.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0e3de5470c2f6687efee85eeb7022cd304b880118fdfc23eee8761ce3374635a/analysis/1520851260/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d680-0e8c-4566-9606-4af502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d680-a380-4f8e-a07e-439102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 10:41:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d680-d408-481c-86f7-4b5c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ca040b60-0f2e-42d9-9503-73c4fe312591",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:48.000Z",
"modified": "2018-03-13T13:47:48.000Z",
"pattern": "[file:hashes.MD5 = '82fb310217a19b5a18a8a89a7a71fcec' AND file:hashes.SHA1 = 'db12e4e79808e0089f78b27c2a8e66462fefed45' AND file:hashes.SHA256 = '7cbcb52a2d8de4b64ccc9b885e43e39823de8c327705abe45b8bcab2b17d548e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4c3be041-e873-416f-a301-ac3f2e8ba8cd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:46.000Z",
"modified": "2018-03-13T13:47:46.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7cbcb52a2d8de4b64ccc9b885e43e39823de8c327705abe45b8bcab2b17d548e/analysis/1520439426/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d682-77c0-4692-9261-4b8e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d683-14ac-4ade-b706-4c8d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:17:06",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d683-6b50-49fa-8abd-466402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--41cff4ef-ba06-42ac-a0a6-01e30418969e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:50.000Z",
"modified": "2018-03-13T13:47:50.000Z",
"pattern": "[file:hashes.MD5 = '359745eae11ef65e0bf88700ea5b94aa' AND file:hashes.SHA1 = '63046f4fdbbd5dac4f06e146fbfcbe87ea0c464c' AND file:hashes.SHA256 = 'cdd034e8c27dcaf9baad53fa038b5931f2aeb4f313980fd99b5eb7d615df3458']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5f59b1cf-7051-497b-85ae-26bb254d7664",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:48.000Z",
"modified": "2018-03-13T13:47:48.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cdd034e8c27dcaf9baad53fa038b5931f2aeb4f313980fd99b5eb7d615df3458/analysis/1520376477/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d684-9e70-4e73-beae-4e8102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d685-055c-4c2e-87b6-4ddd02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:57",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d685-b19c-40c8-a439-462a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1f9b7984-58b4-4bdd-9b7e-c2782de29504",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:52.000Z",
"modified": "2018-03-13T13:47:52.000Z",
"pattern": "[file:hashes.MD5 = '88aeb1bf08ade97d24ea8e379cb923a8' AND file:hashes.SHA1 = 'b189ea64e1a3054a1b2e617624e06649e912d42e' AND file:hashes.SHA256 = 'ffd17e07e3b64207128b0b10f7b638c8bc97022f07b4410e7de28ad07650db09']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9c900612-9431-4577-8580-6099cfb0e4d4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:50.000Z",
"modified": "2018-03-13T13:47:50.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ffd17e07e3b64207128b0b10f7b638c8bc97022f07b4410e7de28ad07650db09/analysis/1520441608/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d687-6fe4-40e8-a37c-4beb02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d687-0a8c-4850-a8c9-47b502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:53:28",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d687-f940-4f74-a60d-472c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a731aeaa-5c51-454a-8690-3c7622717b8c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:54.000Z",
"modified": "2018-03-13T13:47:54.000Z",
"pattern": "[file:hashes.MD5 = '8d5449a992c4e07254ff830a3bbf2c6f' AND file:hashes.SHA1 = 'e2a90158d33b61a828c8199a1eb0c9124119d49c' AND file:hashes.SHA256 = '7ec64290f1e946d9d0c20a03d9319f92e401ced19e0efe0d8770db75cad67278']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--dbba2e99-1c39-493e-b7f1-5e50c4b677dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:53.000Z",
"modified": "2018-03-13T13:47:53.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7ec64290f1e946d9d0c20a03d9319f92e401ced19e0efe0d8770db75cad67278/analysis/1520913597/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d689-1780-4533-b227-486d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d689-0b0c-4367-9e13-4d5e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:59:57",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d689-1c9c-4308-a21d-44e302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--17f52d1f-c8ce-45c8-996b-38d624db86c9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:57.000Z",
"modified": "2018-03-13T13:47:57.000Z",
"pattern": "[file:hashes.MD5 = '34de72c486440b5f26163b7cae6a356c' AND file:hashes.SHA1 = '9744f2b436b0cb6c3254d7f5e83661415c227bd9' AND file:hashes.SHA256 = '9cdd5a451b12b913bc48ae99877f3f3ae830e94fdc7a93bc919c8b31eb2dd8de']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f48c3488-0954-4be2-972d-05c233558f73",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:55.000Z",
"modified": "2018-03-13T13:47:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9cdd5a451b12b913bc48ae99877f3f3ae830e94fdc7a93bc919c8b31eb2dd8de/analysis/1511747984/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d68b-f07c-49c5-aa5a-4d6502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "53/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d68c-4110-464e-9f17-499002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-27 01:59:44",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d68c-5d64-4fde-9bcc-492502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ca0e53e1-d879-426b-9b6f-a60fc942957a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:59.000Z",
"modified": "2018-03-13T13:47:59.000Z",
"pattern": "[file:hashes.MD5 = '50306a1e946ec6fee6ca45d75b612468' AND file:hashes.SHA1 = '626263cd9b2c53e67e8eef9723055477091f3305' AND file:hashes.SHA256 = '5e669d80d7dde5dad3b86547f4b9a89dde17a39470a929d829e84a90442d986d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:47:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--85d876f7-0257-4977-9817-d92fe656f507",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:47:57.000Z",
"modified": "2018-03-13T13:47:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5e669d80d7dde5dad3b86547f4b9a89dde17a39470a929d829e84a90442d986d/analysis/1520438807/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d68e-7f30-41f8-97ec-4d9e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d68e-d438-4bf7-9bd8-49aa02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:06:47",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d68e-b838-44c7-9508-40e402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c95b1e9d-e2de-413e-9ffb-4b87f049250b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:01.000Z",
"modified": "2018-03-13T13:48:01.000Z",
"pattern": "[file:hashes.MD5 = 'b418120f5a7b2acdad58c9c129293730' AND file:hashes.SHA1 = 'eab17c2d6eb186a6c1a7d161ff1424a88f6f319d' AND file:hashes.SHA256 = '258989c785d7b5d50cd4a9a5c2fc6b27ad84912c80c079c896db23bb64ac9772']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--83fe5578-3bef-44db-a66d-be68a3cbc329",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:00.000Z",
"modified": "2018-03-13T13:48:00.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/258989c785d7b5d50cd4a9a5c2fc6b27ad84912c80c079c896db23bb64ac9772/analysis/1519923991/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d690-d9c0-499f-b4a9-4a4d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "26/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d690-7bbc-4f7b-a99a-467302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-01 17:06:31",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d690-a060-4a53-a7c0-497c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--06e88af6-9100-4e50-aed7-494831bf2a2a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:04.000Z",
"modified": "2018-03-13T13:48:04.000Z",
"pattern": "[file:hashes.MD5 = '086990f9248b55b908439368bbf9c29c' AND file:hashes.SHA1 = '0dbbcde57ebaaa8607806280177cefdfe88cdc6f' AND file:hashes.SHA256 = '37ae9bf28a5761205b13fcd0c1d5790ee2f6685acbcbbbc18eaffd08f1879494']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e24a4551-324f-44dc-a13f-3fea25676610",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:02.000Z",
"modified": "2018-03-13T13:48:02.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/37ae9bf28a5761205b13fcd0c1d5790ee2f6685acbcbbbc18eaffd08f1879494/analysis/1520376431/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d692-c964-495c-b06a-4a9302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d692-5368-425b-9755-491102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:11",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d692-f920-4d81-b6ad-44fd02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--59eda1ba-179f-4293-bd44-50871517d08a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:06.000Z",
"modified": "2018-03-13T13:48:06.000Z",
"pattern": "[file:hashes.MD5 = '151c2c242a9ee4e72a0731df6f56c921' AND file:hashes.SHA1 = 'dc98c1d9f891b5292cc4e8d8d8d63702d516f996' AND file:hashes.SHA256 = 'eeb435abd819f5ec850aba835f52125beba9d45e3d86ac0000eafc27f9844dc8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d834c18d-a902-4c28-857c-4a0da7c92148",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:04.000Z",
"modified": "2018-03-13T13:48:04.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/eeb435abd819f5ec850aba835f52125beba9d45e3d86ac0000eafc27f9844dc8/analysis/1506476436/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d694-9f04-452d-a00b-413002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d695-8e18-4da5-9a17-441002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-09-27 01:40:36",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d695-6948-4368-800f-46d602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a2c02004-e597-42d9-8a99-a8e678e68dfd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:08.000Z",
"modified": "2018-03-13T13:48:08.000Z",
"pattern": "[file:hashes.MD5 = '19df8ec2dce7fad0ed46f1e63d2adf92' AND file:hashes.SHA1 = '06956e6b691053e8ca1a62d0def55ffb7d63fd4a' AND file:hashes.SHA256 = '8d3b61d3137f802673644ecb3f673128df1afea1b96926283bb007b7dd681602']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d575295b-27a7-4e8d-ae64-606955c6bcc7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:07.000Z",
"modified": "2018-03-13T13:48:07.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8d3b61d3137f802673644ecb3f673128df1afea1b96926283bb007b7dd681602/analysis/1520439798/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d697-e7b4-41fa-a1f1-4a7702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d697-1e18-4725-b5ce-47eb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:23:18",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d697-f4d8-454e-b43a-489202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--becac4fa-8cc6-4b3b-823f-cb2f413a18c8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:11.000Z",
"modified": "2018-03-13T13:48:11.000Z",
"pattern": "[file:hashes.MD5 = 'c5d7d43efa69bc3ec1c5ba00ee499b32' AND file:hashes.SHA1 = '4f35798e4e9896c7e2d1fc6d0ab941d7f2d1b4fd' AND file:hashes.SHA256 = '33a5975e9efb51377b2b5fec1b4313e87d4cef1a7858390e64ddcfc28e1267c7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--34023aca-655f-4916-b588-65ed3f78c8cc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:09.000Z",
"modified": "2018-03-13T13:48:09.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/33a5975e9efb51377b2b5fec1b4313e87d4cef1a7858390e64ddcfc28e1267c7/analysis/1520438004/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d699-072c-4c80-891d-429e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d69a-5c5c-4ae3-b16c-43b402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:53:24",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d69a-babc-4780-a915-44f202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--df145429-2ca1-436f-b388-10fa744f43db",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:13.000Z",
"modified": "2018-03-13T13:48:13.000Z",
"pattern": "[file:hashes.MD5 = '00a7b96790c3ca21f7e5bdcdfe7a15e7' AND file:hashes.SHA1 = '33b861b31419dbc6b21d2fa4444a8a78b988ea13' AND file:hashes.SHA256 = 'f82333a95a38167b554da0a6d2da54b19a0c633e6d8aa3a3a47c98a3fee304ab']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6c998244-f800-48ff-98d8-3f232c8f21c8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:11.000Z",
"modified": "2018-03-13T13:48:11.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f82333a95a38167b554da0a6d2da54b19a0c633e6d8aa3a3a47c98a3fee304ab/analysis/1520441422/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d69b-300c-4140-977d-409502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d69c-4b20-46e2-9a1e-4ae002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:50:22",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d69c-bc78-4c67-b6f2-462202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--78f1fadb-c0cb-4ea2-8aec-0c43d2f960e0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:15.000Z",
"modified": "2018-03-13T13:48:15.000Z",
"pattern": "[file:hashes.MD5 = 'bf6e116ded5ec532d467a96f368bf4a4' AND file:hashes.SHA1 = '9cd7cdd38e5405e61353e4fa095c9b718f3ee515' AND file:hashes.SHA256 = '56bfcdd6d4fa3414ddeaefedbae3d5c1914f2d183c69ffff70929dfee80a0d8e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a0a0caae-59b2-41c5-b073-243c37515fba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:14.000Z",
"modified": "2018-03-13T13:48:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/56bfcdd6d4fa3414ddeaefedbae3d5c1914f2d183c69ffff70929dfee80a0d8e/analysis/1520376518/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d69e-5b38-4633-9d20-486c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d69e-5548-4132-9b1a-4cab02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:38",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d69e-9314-40c8-a3c5-409e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b1adda64-9a8b-4634-8e63-327e75d42eb8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:17.000Z",
"modified": "2018-03-13T13:48:17.000Z",
"pattern": "[file:hashes.MD5 = '07bb7384fc75df9e7287736aae4049c7' AND file:hashes.SHA1 = 'e2ba239cf29bd9713e59797b2de06c3c04c9ac9b' AND file:hashes.SHA256 = 'bd7138482a831b4a81150dda541b2375a10796dd365e5af441caabeea42bf455']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f7b56700-8e0d-4fb3-9a59-08cef7c60a30",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:16.000Z",
"modified": "2018-03-13T13:48:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/bd7138482a831b4a81150dda541b2375a10796dd365e5af441caabeea42bf455/analysis/1520488314/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6a0-d654-44c8-aec8-4e0502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6a0-6378-40f2-bfe9-40a002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:51:54",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6a0-1ecc-4760-863e-4f1202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ee11a006-60cb-4c20-b2db-27b8408162d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:20.000Z",
"modified": "2018-03-13T13:48:20.000Z",
"pattern": "[file:hashes.MD5 = 'd42075d95856d2edc5c377718039ed39' AND file:hashes.SHA1 = 'ccbd0ce294b04aaf467ea924ebc785ce92640907' AND file:hashes.SHA256 = '19699d486840e392aa9b9630ab5df16233cca09230d7da30b60bb60cf973150c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--61bc1c8c-cd0e-4f35-87ef-c686650b7622",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:18.000Z",
"modified": "2018-03-13T13:48:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/19699d486840e392aa9b9630ab5df16233cca09230d7da30b60bb60cf973150c/analysis/1515154532/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6a2-6088-40f0-a91f-4be902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6a3-6700-4554-95a5-444902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-05 12:15:32",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6a3-1a50-4698-8a72-40f902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--44b91ea0-d5c5-45b2-b85a-cf3d37d53086",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:22.000Z",
"modified": "2018-03-13T13:48:22.000Z",
"pattern": "[file:hashes.MD5 = '2ba93bc284cb2136f4b882a9548246f9' AND file:hashes.SHA1 = '7ca7f650909160cc90a5261fa660a25160c1f217' AND file:hashes.SHA256 = '77482b48f56ef3a4132b52fb70432634b58ec165191fbcfbf9a0cbfbd1bccad5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--483cd876-ce01-40a6-a4d2-0f11987cd0da",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:20.000Z",
"modified": "2018-03-13T13:48:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/77482b48f56ef3a4132b52fb70432634b58ec165191fbcfbf9a0cbfbd1bccad5/analysis/1520488504/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6a5-794c-401b-b414-4fd402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6a5-79c4-4119-bb42-430202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:55:04",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6a5-1a70-42db-9093-4a5602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6b50419e-57d0-43b7-bc75-8c92995bea47",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:24.000Z",
"modified": "2018-03-13T13:48:24.000Z",
"pattern": "[file:hashes.MD5 = '1243c541bf07404279c1a42e4ec5c211' AND file:hashes.SHA1 = '7a56a988ccafcfa3ac34ef5d898381d274c31cf5' AND file:hashes.SHA256 = 'a78cde697ef1aa54eb3ad74dcc0f1a40b5aec3ef936e213e7fd38480e07e919c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8a1d430b-966e-4e9e-86f5-fcf619c3dc87",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:23.000Z",
"modified": "2018-03-13T13:48:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a78cde697ef1aa54eb3ad74dcc0f1a40b5aec3ef936e213e7fd38480e07e919c/analysis/1495623955/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6a7-9e58-4ea2-a99e-4eb602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/61",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6a7-47ac-4074-a234-445d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-05-24 11:05:55",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6a7-bbe8-439c-bfeb-460902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--78c3f029-acfc-4d24-94f2-18058e811bd6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:27.000Z",
"modified": "2018-03-13T13:48:27.000Z",
"pattern": "[file:hashes.MD5 = 'ea592197a398714700eec0b1b4ee8e33' AND file:hashes.SHA1 = '85c1052f392c6f39c368dcf5d5cc39890cbdabf2' AND file:hashes.SHA256 = 'a85ec8d623a497bd37efe216f8bd9e88ad24050949aacaf66461165ba09d5861']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--73af1f83-a272-4099-b219-b05e77c7d7e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:25.000Z",
"modified": "2018-03-13T13:48:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a85ec8d623a497bd37efe216f8bd9e88ad24050949aacaf66461165ba09d5861/analysis/1518777123/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6a9-ef40-4078-a28d-420802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6a9-2ecc-46d2-bf78-4c6e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-16 10:32:03",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6a9-6600-4509-ac14-48b302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e2f6f53c-1b21-4f9b-ba9c-da35fc181c97",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:29.000Z",
"modified": "2018-03-13T13:48:29.000Z",
"pattern": "[file:hashes.MD5 = 'abb3999414e91387ca12fb46aeb02e4b' AND file:hashes.SHA1 = 'a1d7cb0dc453f23c5e82f64c23344fe92dda0df9' AND file:hashes.SHA256 = '23b4a46ddb5f904cd8c0a8b8eebfc623380a587a53c79469fd24b1724401fa0f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e19b532c-dd5a-4278-ae1c-372d66b8b146",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:27.000Z",
"modified": "2018-03-13T13:48:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/23b4a46ddb5f904cd8c0a8b8eebfc623380a587a53c79469fd24b1724401fa0f/analysis/1520488415/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6ab-f134-466c-bfa9-45c202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6ac-9c34-46e3-8d6e-4cc302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:53:35",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6ac-9798-4514-a443-45f002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7737ccff-f82f-494b-90cc-1b22e2c2b6b5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:31.000Z",
"modified": "2018-03-13T13:48:31.000Z",
"pattern": "[file:hashes.MD5 = '1f3383fec72b09050d5433266233ba0c' AND file:hashes.SHA1 = '1b196a21b3146d6711528c27c4be0fc2bdf947b1' AND file:hashes.SHA256 = '91f122e42535165233ef5657279eadcc15bd90e723a13fb1b51ab9096b6e582d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0d6879bc-8075-4bf5-9a98-f06c6991f1ac",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:30.000Z",
"modified": "2018-03-13T13:48:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/91f122e42535165233ef5657279eadcc15bd90e723a13fb1b51ab9096b6e582d/analysis/1515015363/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6ae-24b4-4dde-8828-468f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6ae-c8b8-4e84-9870-43e502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 21:36:03",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6ae-a704-48f9-ad62-4d9402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--08609b6c-4c68-4ab4-8a22-8ce67ae5dd55",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:34.000Z",
"modified": "2018-03-13T13:48:34.000Z",
"pattern": "[file:hashes.MD5 = '920dcb7686f127752b2064187610ef5b' AND file:hashes.SHA1 = 'e5f4ec2a392c60eb4c9ba38310f81237809e67df' AND file:hashes.SHA256 = 'e8dcdb7f6d3108ba1ad0800ba6167f7456e4a1b2c95038ecd7960989402f54ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1f4d6780-90cb-4281-95a5-6524ce6145d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:32.000Z",
"modified": "2018-03-13T13:48:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e8dcdb7f6d3108ba1ad0800ba6167f7456e4a1b2c95038ecd7960989402f54ca/analysis/1520376545/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6b0-4230-4618-b98d-41d002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "42/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6b1-9298-4f21-b71e-4e5602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:49:05",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6b1-7c74-4a41-a855-4a6302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b485a76-ed4a-4832-8601-93576827def2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:36.000Z",
"modified": "2018-03-13T13:48:36.000Z",
"pattern": "[file:hashes.MD5 = '85221e7c9ea46e46d1fb8b714b1c3cec' AND file:hashes.SHA1 = 'f2a5151f935f7378f6118aa406f9d7da9098f2b9' AND file:hashes.SHA256 = '309d3a5549fe176866c18d11bbf03899cece1b666e9b28358daf9aba3efd2068']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bfe8c8f1-123f-4fbe-9a57-ca43bda77bbb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:34.000Z",
"modified": "2018-03-13T13:48:34.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/309d3a5549fe176866c18d11bbf03899cece1b666e9b28358daf9aba3efd2068/analysis/1520437899/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6b2-753c-4ea0-8d4f-46cf02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6b3-89e8-4512-be02-4d4502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:51:39",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6b3-91a4-4b3e-a0f3-43b202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ccb0100a-cc61-45c9-a42e-946b0b9a2bbe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:38.000Z",
"modified": "2018-03-13T13:48:38.000Z",
"pattern": "[file:hashes.MD5 = '214cf04320b749b795c189cf7cd2d804' AND file:hashes.SHA1 = '462dcfe908d67f60c19d4a5b94653ab87b2078ef' AND file:hashes.SHA256 = '9371809d87c41170ba8bfab3241f5b31d664035c9a249ba6541ff9cd57cb374e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3d1d4143-fd00-4946-b5c3-227bf730b271",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:38.000Z",
"modified": "2018-03-13T13:48:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9371809d87c41170ba8bfab3241f5b31d664035c9a249ba6541ff9cd57cb374e/analysis/1520440045/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6b8-93dc-4247-bea2-44c602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6b8-a280-4985-85f4-4d3102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:27:25",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6b8-2a10-4810-af93-402002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d28c925e-1dc6-4915-8cc1-31b30c1d3d77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:43.000Z",
"modified": "2018-03-13T13:48:43.000Z",
"pattern": "[file:hashes.MD5 = 'cf6c098d4eff4facdc4212f5c1ccba05' AND file:hashes.SHA1 = '78f9eb44e86d5e48dc2211ded1c43083fd908bc7' AND file:hashes.SHA256 = 'ecfeced9d622807d2b82b64fc2ba725603f9116f41e1ddb58715e1f751bbebb9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7295e73f-9200-4da9-9cee-1235ab0ef8c0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:42.000Z",
"modified": "2018-03-13T13:48:42.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ecfeced9d622807d2b82b64fc2ba725603f9116f41e1ddb58715e1f751bbebb9/analysis/1520913241/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6ba-aabc-4cff-bce6-45f702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6ba-cb4c-4141-a8c7-4de502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:54:01",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6ba-f568-4e35-a7ed-4bc702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--031272c7-aeea-4886-bc0e-c82c2399ced1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:46.000Z",
"modified": "2018-03-13T13:48:46.000Z",
"pattern": "[file:hashes.MD5 = 'ed04402ceb7302ecb8a3455a2c6315c1' AND file:hashes.SHA1 = 'a87e3e8b7a9d0867639a50401cf0f702305ef196' AND file:hashes.SHA256 = '88ad17307f86b59c35f1c424cf785343ae93a58979ecbb063e6f44603675b918']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6279338c-1317-49e5-9fa3-61d39d1fd85e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:44.000Z",
"modified": "2018-03-13T13:48:44.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/88ad17307f86b59c35f1c424cf785343ae93a58979ecbb063e6f44603675b918/analysis/1520439693/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6bc-a9c0-4c58-b5ed-401602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6bc-501c-4edc-8600-4f5402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:21:33",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6bc-7198-499b-9b70-403302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dd1b94ca-12df-4746-81b9-0f2762545592",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:48.000Z",
"modified": "2018-03-13T13:48:48.000Z",
"pattern": "[file:hashes.MD5 = 'b505ce921aa64ab406410695a9f766e8' AND file:hashes.SHA1 = '69ecdc76bc4932d01410aece2f09f2d67b721db1' AND file:hashes.SHA256 = 'a3e2b07d7094473e7bcfedaf4e1df411f8c4e5113658332dfe1ca32f621ab33d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--345cb4a5-817c-402e-8306-11ac04b71d83",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:46.000Z",
"modified": "2018-03-13T13:48:46.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a3e2b07d7094473e7bcfedaf4e1df411f8c4e5113658332dfe1ca32f621ab33d/analysis/1519015662/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6be-f5bc-42c7-8ef4-479e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6bf-d8dc-4801-9296-4e7702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-19 04:47:42",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6bf-546c-4a6e-bdc7-4c1302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2ac12e74-5306-4785-82c0-7ba96983994a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:50.000Z",
"modified": "2018-03-13T13:48:50.000Z",
"pattern": "[file:hashes.MD5 = '94554309cd1b23a0655017d0a01ae100' AND file:hashes.SHA1 = 'c5a4e5cd885b8cae07e1ecd9e633d208480eac5a' AND file:hashes.SHA256 = '0871d285f67c78a38e6713aeb7b1d76f8777d1d3a5479ed81e543ebcca54a1fe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b55def3e-7c02-45e4-8e38-55ae68cfc362",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:48.000Z",
"modified": "2018-03-13T13:48:48.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0871d285f67c78a38e6713aeb7b1d76f8777d1d3a5479ed81e543ebcca54a1fe/analysis/1520488410/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6c0-57d8-47bd-b13e-4fe402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6c1-584c-47c5-b5eb-425b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:53:30",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6c1-3f88-4036-83f3-442302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b5b1d0ad-ca31-4465-b922-bc5cdda1fe8e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:52.000Z",
"modified": "2018-03-13T13:48:52.000Z",
"pattern": "[file:hashes.MD5 = '5859e84404958b588ff1cd609da002ef' AND file:hashes.SHA1 = '5c59e4466b26bfd4fd3615ae0bc670c8d2eef35c' AND file:hashes.SHA256 = 'f8bdb65d54ccab04a506e84f14bdbeef15f6266a7bd6e4e7dfde69de424dd10a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bcd5c109-6f56-4f18-b58c-0866365f87b1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:50.000Z",
"modified": "2018-03-13T13:48:50.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f8bdb65d54ccab04a506e84f14bdbeef15f6266a7bd6e4e7dfde69de424dd10a/analysis/1520275555/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6c3-e944-4ea1-acb8-413b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6c3-4c08-4c9b-a2ba-480c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-05 18:45:55",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6c3-962c-4339-8ace-4f2602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f19950c-9a19-4b31-8f00-1af92d3a1bc0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:54.000Z",
"modified": "2018-03-13T13:48:54.000Z",
"pattern": "[file:hashes.MD5 = '055b9accac2fdec9508b4f1edadb4849' AND file:hashes.SHA1 = 'fb9258172e84a2474203e50b863ec561156f3aa4' AND file:hashes.SHA256 = '50de5d472ca4336f21c1c54eddfac7da2dcb2b0062cb82bc23232af51488f48c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1d20673f-8d52-47c7-9740-2ba5d4dfcb48",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:53.000Z",
"modified": "2018-03-13T13:48:53.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/50de5d472ca4336f21c1c54eddfac7da2dcb2b0062cb82bc23232af51488f48c/analysis/1517539310/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6c5-913c-4e45-a97b-420502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "40/64",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6c5-d710-4a25-8642-436102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-02 02:41:50",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6c5-43ac-49f6-89fc-46ad02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4998219b-3f2a-4415-9120-aec6680e1e44",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:57.000Z",
"modified": "2018-03-13T13:48:57.000Z",
"pattern": "[file:hashes.MD5 = '284586a84c24b5d37f6744372c666583' AND file:hashes.SHA1 = '60133923e201f7a94165d76a4b9ef4989355eeb8' AND file:hashes.SHA256 = 'ab0ca8231c11d7f0aa9ac32e270b86eece17946a8fc12220788f9bec35b9f584']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--80e03ba7-89f4-44f2-a0e4-6392a20743b2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:55.000Z",
"modified": "2018-03-13T13:48:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ab0ca8231c11d7f0aa9ac32e270b86eece17946a8fc12220788f9bec35b9f584/analysis/1520440362/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6c7-7344-476f-85d5-47ab02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6c7-a3bc-45fe-8a46-4dec02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:32:42",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6c7-2574-4bc1-8ce1-4e9902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bfdac829-84e7-422b-98b4-6c2668aa0587",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:59.000Z",
"modified": "2018-03-13T13:48:59.000Z",
"pattern": "[file:hashes.MD5 = '248f0ea99838dcc62104aafeee02f0be' AND file:hashes.SHA1 = '96ea1a29786c0466c1b1765cb80bdc8f28a9117a' AND file:hashes.SHA256 = 'e854dbc8dfe31447083411d4f597de00e4addfe265a3c3103d8d3a5961ec82f0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:48:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--af568763-fed7-4558-9441-26b2cc6362b9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:48:57.000Z",
"modified": "2018-03-13T13:48:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e854dbc8dfe31447083411d4f597de00e4addfe265a3c3103d8d3a5961ec82f0/analysis/1520406564/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6c9-327c-48f9-9e1e-459302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6c9-1690-47e8-be55-466902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 07:09:24",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6c9-7ee0-4061-b3a3-40da02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--86bad043-2708-431a-ba23-f83d6450e4ab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:01.000Z",
"modified": "2018-03-13T13:49:01.000Z",
"pattern": "[file:hashes.MD5 = '4751f5e3b35e143a71c996fab767fd94' AND file:hashes.SHA1 = 'e2c992c24702a19cd82db1a15eac75969962ec5c' AND file:hashes.SHA256 = '5d902968cb85bfa17f280d8b4ab9757b650760638f39ed43301053f67b67c5fe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--35347bf8-788b-482c-b431-3b6258b1e9b8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:01.000Z",
"modified": "2018-03-13T13:49:01.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5d902968cb85bfa17f280d8b4ab9757b650760638f39ed43301053f67b67c5fe/analysis/1520838986/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6cd-cc70-418b-9214-4cc502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6cd-5cc8-4046-971f-47c702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 07:16:26",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6cd-8624-4eaf-b7bd-43d202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8e08f62d-c431-4475-a0da-023c8f670606",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:05.000Z",
"modified": "2018-03-13T13:49:05.000Z",
"pattern": "[file:hashes.MD5 = 'be6cf8e8ad3f4aa06d407fff3a95dc7e' AND file:hashes.SHA1 = 'bf1ce15de4d6cdf9a3e9abe72383589caf4aa6d1' AND file:hashes.SHA256 = '528bcdce7e1fc467c414267d8ab1cd0022071bc4ca304d2cbb90446f2540d799']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a3062c18-d293-46c0-9175-e3c86691eea4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:03.000Z",
"modified": "2018-03-13T13:49:03.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/528bcdce7e1fc467c414267d8ab1cd0022071bc4ca304d2cbb90446f2540d799/analysis/1520438647/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6cf-f680-44bc-bfd0-483302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "59/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6d0-4dac-453a-8bff-41b402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:04:07",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6d0-a988-4be2-a49e-40a202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb23222d-61f4-420f-97e5-208d0df4d905",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:07.000Z",
"modified": "2018-03-13T13:49:07.000Z",
"pattern": "[file:hashes.MD5 = '9f139853e3b03ec7b833cd731cf9b171' AND file:hashes.SHA1 = '9d45536fcca3da6c12d36337a324d864121ddc6a' AND file:hashes.SHA256 = 'a5c8ec7e44ca6bdbb20f1234df90d2937372f629f9c0d39d5f4eac0c8e716653']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b3c43305-f706-4271-a3cc-9dd6a47f013e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:06.000Z",
"modified": "2018-03-13T13:49:06.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a5c8ec7e44ca6bdbb20f1234df90d2937372f629f9c0d39d5f4eac0c8e716653/analysis/1520376462/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6d2-1788-4e7a-9ae5-418d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6d2-b828-4179-8fa6-40db02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:42",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6d2-e2f8-442e-a00a-48ca02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--be84377d-270c-48ad-bd4e-797b86509254",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:10.000Z",
"modified": "2018-03-13T13:49:10.000Z",
"pattern": "[file:hashes.MD5 = 'd17899b0c380bfb74fdbf28e82aeab51' AND file:hashes.SHA1 = 'c25bc958ef7eea14ce46056f701bb8a697e65d40' AND file:hashes.SHA256 = 'abf127380298bbfa143f58fe58b862808d7ca5f52e1c5daf67f917efd3372639']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--54a18057-87d9-4091-a8f5-e919a6af8f8e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:08.000Z",
"modified": "2018-03-13T13:49:08.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/abf127380298bbfa143f58fe58b862808d7ca5f52e1c5daf67f917efd3372639/analysis/1520488540/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6d4-490c-492b-873f-491402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6d5-648c-442b-a887-489402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:55:40",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6d5-5308-4f50-b24e-4a6502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b97217c8-a47e-418f-9dd7-089aaa3ad22c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:12.000Z",
"modified": "2018-03-13T13:49:12.000Z",
"pattern": "[file:hashes.MD5 = '7e0e4f8e9b0dc65261a5b3e569491527' AND file:hashes.SHA1 = '65ab7c928a752913e04f5b892a8ddb8b37835f76' AND file:hashes.SHA256 = '6e91eb5fbf5962ddd24011d73998d9c005779c32d8a763b57a5ffab0348a265f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--738e4e9c-f2c7-4297-90b3-6f559923bbf3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:10.000Z",
"modified": "2018-03-13T13:49:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/6e91eb5fbf5962ddd24011d73998d9c005779c32d8a763b57a5ffab0348a265f/analysis/1518959567/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6d6-3be8-4e1a-a334-44af02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6d7-488c-4ee5-917e-43d102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-18 13:12:47",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6d7-4a8c-43f3-bee1-413702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e06f91b8-355e-4ea7-9de1-3aa5a3b948bc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:14.000Z",
"modified": "2018-03-13T13:49:14.000Z",
"pattern": "[file:hashes.MD5 = '92b9e6dd4e352a94a37f811ab864e618' AND file:hashes.SHA1 = '2c03f135bbf2c4be7b500c11a9e86b20acaf1ad8' AND file:hashes.SHA256 = '428f8a7ea9ae3e8c52f06afce39aeb65468acceeba9c77ed8c84c740ec61b5b6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9f13752e-3013-45e2-90ec-6b5a99066505",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:13.000Z",
"modified": "2018-03-13T13:49:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/428f8a7ea9ae3e8c52f06afce39aeb65468acceeba9c77ed8c84c740ec61b5b6/analysis/1514997403/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6d9-a068-4ec9-b36c-4d1102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6d9-076c-495c-848c-449502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 16:36:43",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6d9-d0d4-40f0-a996-44ab02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d294a9bb-d773-4cf2-8e2a-3fd99391206f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:17.000Z",
"modified": "2018-03-13T13:49:17.000Z",
"pattern": "[file:hashes.MD5 = 'c22a09864092023ee9bff85b291626f2' AND file:hashes.SHA1 = '64b9665df0669e19a8a299d6b005b929c75f5211' AND file:hashes.SHA256 = 'fa019bb31fd99bfbb36bca3bf9b16c589cacd2f9cee2ba061dbb73479d4c389c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f61c6948-4f4b-4145-af51-b50999bace44",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:16.000Z",
"modified": "2018-03-13T13:49:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/fa019bb31fd99bfbb36bca3bf9b16c589cacd2f9cee2ba061dbb73479d4c389c/analysis/1425551882/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6dc-dbf0-4113-8f6e-49b902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/57",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6dc-8cd4-4258-8a44-449702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2015-03-05 10:38:02",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6dc-0184-47aa-bdbc-40c202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--82299055-ed80-4537-80f5-9436f519f766",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:20.000Z",
"modified": "2018-03-13T13:49:20.000Z",
"pattern": "[file:hashes.MD5 = '6f347d19fcc0d336809ac1c49fdef3c2' AND file:hashes.SHA1 = '4443502cfd80dd39d3c49943df0264872a7bc4c7' AND file:hashes.SHA256 = 'f7dd9c3111f0e0ed831ecf858f98a95389818378526a5c69e0cfea1977638d0a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2d2f3ea6-6d2a-46eb-8fa7-fe52ec43d7be",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:18.000Z",
"modified": "2018-03-13T13:49:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f7dd9c3111f0e0ed831ecf858f98a95389818378526a5c69e0cfea1977638d0a/analysis/1520441396/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6df-eb64-4d56-bd9a-457302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6df-fe54-4eb0-a926-4c8802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:49:56",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6df-65fc-4d79-92ad-42bd02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d6278a28-8753-4bd3-b5dd-b615a535c947",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:23.000Z",
"modified": "2018-03-13T13:49:23.000Z",
"pattern": "[file:hashes.MD5 = '0eb8f30a1b29a3e6ce1d72a417ba7a7a' AND file:hashes.SHA1 = 'fada0c4098da7ff58744bddbe035d405dc04f26c' AND file:hashes.SHA256 = '11c09386ec4cc88136bf85bf2437a28e385d42fea053e95b3d6eb5995e0fabc3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e8b635f4-5d5b-4caf-9d35-c214b6dab867",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:21.000Z",
"modified": "2018-03-13T13:49:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/11c09386ec4cc88136bf85bf2437a28e385d42fea053e95b3d6eb5995e0fabc3/analysis/1520437419/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6e1-7818-42ee-a3f6-401e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6e1-49a0-456e-9024-4ce902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:43:39",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6e1-e698-4381-9921-427802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cb61ffc7-25b6-4635-af6f-bed3089af7e9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:25.000Z",
"modified": "2018-03-13T13:49:25.000Z",
"pattern": "[file:hashes.MD5 = '8c5ecc13e19fecd5215e191f73e40bfe' AND file:hashes.SHA1 = '6d1d952a34b0a40f44adbfd08ed1970cda0a1581' AND file:hashes.SHA256 = 'cfde9188f77427c56c541fba1ff15249dbdf2baf3f466367ba72a5c9a70b0d80']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--804d7a0d-4a71-44fc-a954-6dc9def20bbf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:23.000Z",
"modified": "2018-03-13T13:49:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cfde9188f77427c56c541fba1ff15249dbdf2baf3f466367ba72a5c9a70b0d80/analysis/1520376479/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6e3-a784-4919-9143-498302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6e4-e748-4593-a4ff-458702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6e4-6c84-48f3-8e23-42df02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--cccbb05d-835e-45c2-8022-a743d3ad5851",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:27.000Z",
"modified": "2018-03-13T13:49:27.000Z",
"pattern": "[file:hashes.MD5 = '29ceb92955f0ffc8d347f51555ae46a5' AND file:hashes.SHA1 = '79321be62ec5edcdb3023b460125939d41e541cb' AND file:hashes.SHA256 = 'cc3ceb50174349d9346cee8c330b9d172c8260a7a98d38de34c5322cce53c31b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8d5816f1-dcb6-4f83-8356-64b3ec5b3ba2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:25.000Z",
"modified": "2018-03-13T13:49:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cc3ceb50174349d9346cee8c330b9d172c8260a7a98d38de34c5322cce53c31b/analysis/1517924356/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6e5-b7c4-41f6-970c-4fc902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "26/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6e6-83f4-44fb-bbea-40dd02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-06 13:39:16",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6e6-eaac-4a71-9799-49de02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d7d6852a-a95e-4d3a-84cb-06b3701e6a6a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:29.000Z",
"modified": "2018-03-13T13:49:29.000Z",
"pattern": "[file:hashes.MD5 = '228a7bb6a6d10523afff39da47621133' AND file:hashes.SHA1 = 'a7a638420c84ea2957df25d9798859ff9c6d7744' AND file:hashes.SHA256 = 'ff9785c05c08789800db47812c4e70ab892ecdba07189aa38fe0edbc4b87837d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c3a835d0-178c-475e-8d29-863ad198edde",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:28.000Z",
"modified": "2018-03-13T13:49:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ff9785c05c08789800db47812c4e70ab892ecdba07189aa38fe0edbc4b87837d/analysis/1519707150/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6e8-2d94-47e1-99ab-478d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6e8-fec0-443e-ab22-476002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-27 04:52:30",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6e8-2064-4a4b-9cc4-45ca02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--82a15bb8-9f6d-407e-b744-bb8b9fee2159",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:32.000Z",
"modified": "2018-03-13T13:49:32.000Z",
"pattern": "[file:hashes.MD5 = 'ca703ae06d20fb248e0dd87f4e66a68e' AND file:hashes.SHA1 = '6bcf9f721258a7cd6940239ae4f721f099169f39' AND file:hashes.SHA256 = '125c1da1e9c3806a36d83676288e25226be564dd8ae941df4b3fb3f3a1fec31c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f2656df0-ab61-4366-972e-eb7ccf26e9f3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:30.000Z",
"modified": "2018-03-13T13:49:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/125c1da1e9c3806a36d83676288e25226be564dd8ae941df4b3fb3f3a1fec31c/analysis/1520437471/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6ea-88d8-481b-9673-41c002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6ec-5430-4e41-aca7-4adb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:44:31",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6ec-8e24-439d-b773-49be02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--69820f4d-ae64-4f60-b206-e7f473a8bb57",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:35.000Z",
"modified": "2018-03-13T13:49:35.000Z",
"pattern": "[file:hashes.MD5 = 'd0bac2b89f5b1efb34ad5f2899d9d44b' AND file:hashes.SHA1 = '4583954a455e6300adf43244fdc35dedb5c17458' AND file:hashes.SHA256 = '862432919f8db0049b9a3d59a3511898ad9bc220c0c64ac4a4cb97caff745326']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1712c055-825b-4483-a0d3-dfaa467814df",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:33.000Z",
"modified": "2018-03-13T13:49:33.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/862432919f8db0049b9a3d59a3511898ad9bc220c0c64ac4a4cb97caff745326/analysis/1514997379/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6ed-4880-4d9c-a3e6-49b502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6ee-12c4-4ee7-be5e-42f202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 16:36:19",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6ee-0e34-4d0b-8b92-4d8b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1244ab55-e050-4f27-8815-9829d0d09a58",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:37.000Z",
"modified": "2018-03-13T13:49:37.000Z",
"pattern": "[file:hashes.MD5 = '038b69655eb6476e197279d7e4de680c' AND file:hashes.SHA1 = 'c0db4e556fa193734ff774bc25f9eb4b59717e1b' AND file:hashes.SHA256 = '3d7b183262dc42e6efd8d0c30bc6528c8f3847cb6b6c633b211e18fe4a9723eb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--51b0df0d-f04c-4a11-8e09-bb63da256b07",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:35.000Z",
"modified": "2018-03-13T13:49:35.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3d7b183262dc42e6efd8d0c30bc6528c8f3847cb6b6c633b211e18fe4a9723eb/analysis/1520488434/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6f0-1590-473b-8777-482a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6f0-1b50-4660-bcc0-419e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:53:54",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6f0-4bbc-4b36-9b9e-46d602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3308282a-8f19-47ed-81c4-f5f8cd8d007a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:39.000Z",
"modified": "2018-03-13T13:49:39.000Z",
"pattern": "[file:hashes.MD5 = 'f6fb5b337e32d38ed7f4fd77c982a443' AND file:hashes.SHA1 = 'b99e123791d84c22984c71549238a421a9c6cca1' AND file:hashes.SHA256 = 'f987fa5e278b9998b9c44c723a1892f92868da0b0c856777147fe1b10c7a45ed']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--cf6405fd-7401-4d60-a130-a6224cc18428",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:38.000Z",
"modified": "2018-03-13T13:49:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f987fa5e278b9998b9c44c723a1892f92868da0b0c856777147fe1b10c7a45ed/analysis/1505902909/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6f2-4a1c-48b6-b1b2-422302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "40/64",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6f2-64dc-42c4-bd13-463702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-09-20 10:21:49",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6f2-8a1c-46bd-9829-4e1d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b7aed3f9-8bbc-49b9-96ef-1185d97372fd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:42.000Z",
"modified": "2018-03-13T13:49:42.000Z",
"pattern": "[file:hashes.MD5 = 'f25b450be296f859caee775f42da3721' AND file:hashes.SHA1 = '166361fd7c169863e2e0e8097f8c558e638fd1d6' AND file:hashes.SHA256 = 'de9b33b92113cbd0ec51b9e13596f5320d45bbb7b0222a6a17ed2867a2ff68bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3e466307-8e1a-4b17-b923-67ccffe9fb67",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:40.000Z",
"modified": "2018-03-13T13:49:40.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/de9b33b92113cbd0ec51b9e13596f5320d45bbb7b0222a6a17ed2867a2ff68bb/analysis/1519787666/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6f4-e9c8-48cb-8cdf-4a2002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6f4-d5f0-400b-92b4-479c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-28 03:14:26",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6f4-7954-4b09-92b2-4e5c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--21b42c11-3463-4f2e-9cf5-dc2f947712eb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:44.000Z",
"modified": "2018-03-13T13:49:44.000Z",
"pattern": "[file:hashes.MD5 = 'cc4a9899155402a40357fea885eb2b5f' AND file:hashes.SHA1 = '6be5594b8d81df53dcfbbac7ff07e93bf04f446a' AND file:hashes.SHA256 = '3e0c7e9f5acd8022624325492ab52fbe9df08f03cba21f137d5feb12185a2a3b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5f436b33-8051-4e11-85ac-d19712b3b5f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:42.000Z",
"modified": "2018-03-13T13:49:42.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3e0c7e9f5acd8022624325492ab52fbe9df08f03cba21f137d5feb12185a2a3b/analysis/1520376513/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d6f6-3b68-4bde-a662-403402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6f6-0168-48f5-8ea5-49f602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:33",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d6f6-9c50-4362-acf7-47f802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--83a08501-1293-44f5-972c-a638468112d9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:46.000Z",
"modified": "2018-03-13T13:49:46.000Z",
"pattern": "[file:hashes.MD5 = 'ad41641fc3eb31fe2130b5358e39b724' AND file:hashes.SHA1 = 'd448756c51b53ec040d4b80f02fa59276b26560b' AND file:hashes.SHA256 = 'd7841ad990416b6c46e98331ca6ca133be96dd1c463407f1b0e4bc759b002cfa']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4578fb47-f580-41dd-a90f-baa104b9d39b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:44.000Z",
"modified": "2018-03-13T13:49:44.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d7841ad990416b6c46e98331ca6ca133be96dd1c463407f1b0e4bc759b002cfa/analysis/1520870700/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6f9-6600-44ea-a00d-4a4902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6f9-eed0-4189-9507-415d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 16:05:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6f9-c2d0-43bd-a2b6-40d902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dfdd74ed-2446-41e7-bf1d-e876e277a29d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:48.000Z",
"modified": "2018-03-13T13:49:48.000Z",
"pattern": "[file:hashes.MD5 = '63074bf458228184828d9938941dd12c' AND file:hashes.SHA1 = '81e9ad0bb72e459f2fd47c89cacd01c0efe3fb30' AND file:hashes.SHA256 = 'e4d735594547dc26fbb13846676cdaf387120da23756b4d5ae563da8a7609f3a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--57ebad98-e219-4c11-8ba9-e89e7c956763",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:47.000Z",
"modified": "2018-03-13T13:49:47.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e4d735594547dc26fbb13846676cdaf387120da23756b4d5ae563da8a7609f3a/analysis/1517924354/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6fb-07d4-431f-9877-4fc802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6fb-193c-4567-8d42-446e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-06 13:39:14",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6fb-65f0-4075-bd20-4a5d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9bc65993-ca59-4309-83d8-0444b2fb8c06",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:51.000Z",
"modified": "2018-03-13T13:49:51.000Z",
"pattern": "[file:hashes.MD5 = '8bb3ba30f2d004437b878829c54c84bf' AND file:hashes.SHA1 = '36bd8afb99dc238c2b90d61f43219be331714e5d' AND file:hashes.SHA256 = 'd1509de315be40dac5807a016fd4c843abda063012d29732720db7087bb73f1b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--af6df848-4958-4d51-b02b-f26f53e48132",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:49.000Z",
"modified": "2018-03-13T13:49:49.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d1509de315be40dac5807a016fd4c843abda063012d29732720db7087bb73f1b/analysis/1515019229/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d6fd-598c-450d-9b9b-4c3402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "27/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6fe-391c-49b0-80ee-47b702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 22:40:29",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d6fe-76e8-4823-a370-442502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--978c6c81-588f-493c-b3db-a6d8a2a47990",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:53.000Z",
"modified": "2018-03-13T13:49:53.000Z",
"pattern": "[file:hashes.MD5 = '7b05ddf250dc05dc6135723ff0389407' AND file:hashes.SHA1 = 'b0b1aa9b4b748617fc8306e0cbf9cc139cc6b3c8' AND file:hashes.SHA256 = '08281fb7677a651351a9b0a1ad5c4dace6748104d210cf6f9aecce0935b31007']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--aea5d4a9-d27a-4a59-b732-317d060c8df3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:51.000Z",
"modified": "2018-03-13T13:49:51.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/08281fb7677a651351a9b0a1ad5c4dace6748104d210cf6f9aecce0935b31007/analysis/1520437282/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d700-09cc-4c90-9f43-43f802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d700-0f54-4c1d-8122-4af002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:41:22",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d700-8a90-400e-8fe1-4a3502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b4ac89c0-7022-47ba-b5b6-b7d6f505aebd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:55.000Z",
"modified": "2018-03-13T13:49:55.000Z",
"pattern": "[file:hashes.MD5 = '1e785429526cc2621baf8bb05ed17d86' AND file:hashes.SHA1 = 'da4247104540eb884f41780e675d8b3e1c116faa' AND file:hashes.SHA256 = '00e3bcfd0ef917c73c5a3818daf5bc0271fb3da53817df1215c20bfa5e4e91da']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--cea5961c-f56f-47ed-805c-8ead55535284",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:54.000Z",
"modified": "2018-03-13T13:49:54.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/00e3bcfd0ef917c73c5a3818daf5bc0271fb3da53817df1215c20bfa5e4e91da/analysis/1520873400/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d702-073c-45ae-a0ae-46e902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d702-1fb8-4e7d-a009-468302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 16:50:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d702-2d20-4119-840b-452d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5c173e41-3f6a-45b7-8dc3-9fd00209ec77",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:57.000Z",
"modified": "2018-03-13T13:49:57.000Z",
"pattern": "[file:hashes.MD5 = 'e6491fb88600c6dad54a9bc22374d697' AND file:hashes.SHA1 = 'b055ab57f2b0276d859be243a9240965637aa4bd' AND file:hashes.SHA256 = '9e0ec586bb991db7b41440e6ab3988f7b379c17e7a8963e8f41ab153960b5b24']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:49:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e8449b46-a354-467e-9e49-68031b6e1752",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:56.000Z",
"modified": "2018-03-13T13:49:56.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9e0ec586bb991db7b41440e6ab3988f7b379c17e7a8963e8f41ab153960b5b24/analysis/1520488374/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d704-a0b4-4d67-9832-4e7502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d704-5350-4da3-8adc-4d1502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:52:54",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d704-742c-46df-875f-488702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--620fa80a-ff56-4958-893f-c9178f12924a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:00.000Z",
"modified": "2018-03-13T13:50:00.000Z",
"pattern": "[file:hashes.MD5 = 'e9aea6fbdff039686afefe629db6c23e' AND file:hashes.SHA1 = '509e62d2c8df86d102716909db0f17e79c4d0f84' AND file:hashes.SHA256 = '4e6d9c92c20174b07a6582b5dcc862536fbdce1a5964340dc5b238b3885985d2']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f6d1820f-b409-4ae6-8576-398772a06e02",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:49:58.000Z",
"modified": "2018-03-13T13:49:58.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4e6d9c92c20174b07a6582b5dcc862536fbdce1a5964340dc5b238b3885985d2/analysis/1512568369/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d706-ab3c-4dd1-a18e-4c4b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "43/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d706-82dc-4ccc-90ba-4b7802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-06 13:52:49",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d706-76ac-4023-bb67-451202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2b5a4323-cc12-4e0f-b80f-932c607e3061",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:02.000Z",
"modified": "2018-03-13T13:50:02.000Z",
"pattern": "[file:hashes.MD5 = '9357ef1690f7d4435d37553c760acc3e' AND file:hashes.SHA1 = '6b10b9c7a6e9e156171b775f2a5a7cd7a84e9d93' AND file:hashes.SHA256 = 'be5e420236c341bac83cdcfe4e3ec58ac9b32ca2c36af1596bf0e3642ab29d1c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--914a9489-58b9-4d1c-9bfd-c89783e85427",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:00.000Z",
"modified": "2018-03-13T13:50:00.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/be5e420236c341bac83cdcfe4e3ec58ac9b32ca2c36af1596bf0e3642ab29d1c/analysis/1520440893/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d708-7170-462b-b8e1-477202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d709-1bec-48ef-b95e-438402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:41:33",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d709-9f74-4f75-a4eb-4a4302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5fa6a990-0c0c-45a2-b44f-8f6b2fb92d30",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:04.000Z",
"modified": "2018-03-13T13:50:04.000Z",
"pattern": "[file:hashes.MD5 = 'a78829d6528c7894d54cbb6232a99c79' AND file:hashes.SHA1 = '27f2d19d3bd95fe7ca8d257594e704ff55960eaf' AND file:hashes.SHA256 = '7e270f53bd36b34ef6f9e711b1943b582c95a7bac27263356e9d97273a3dbabe']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--29ed7fda-0038-4836-890f-220300a61011",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:03.000Z",
"modified": "2018-03-13T13:50:03.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7e270f53bd36b34ef6f9e711b1943b582c95a7bac27263356e9d97273a3dbabe/analysis/1520906460/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d70b-f904-4e80-b57d-4f2c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d70c-c4b8-47f8-97e6-4d6402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 02:01:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d70c-c730-415c-a722-4c8802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b8edda24-98d3-4d12-b8f1-0b075e5127e1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:07.000Z",
"modified": "2018-03-13T13:50:07.000Z",
"pattern": "[file:hashes.MD5 = 'be781592db7b68fcc27aeefe5dbec8b1' AND file:hashes.SHA1 = 'd4925c4922a8a989617812d58bac72dfb3e59212' AND file:hashes.SHA256 = 'c1c6df93b8a8be0778e11214954017d9bf9971e30bef80a4c2031aadb2c63e3b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:07Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f17b3e60-ddc8-4acf-9c1a-23484fb6bdb4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:05.000Z",
"modified": "2018-03-13T13:50:05.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/c1c6df93b8a8be0778e11214954017d9bf9971e30bef80a4c2031aadb2c63e3b/analysis/1515018304/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d70e-d8c8-4959-833b-437002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d70e-2830-467f-babb-442402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 22:25:04",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d70e-a8b8-42de-a6f7-481802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--856f07d3-d2ca-4f97-bcc9-9c42047e154b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:09.000Z",
"modified": "2018-03-13T13:50:09.000Z",
"pattern": "[file:hashes.MD5 = '1696135d04503e48e29ffa3474a5a76a' AND file:hashes.SHA1 = 'f5ffa229079f22616cbed51e2daf713cbed8e417' AND file:hashes.SHA256 = '73c3d7970dea0238c98275f925f18d4f3a66237a6b270a2732cca31193612f90']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e81ed941-5baf-4a9f-9478-1a82e2806177",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:08.000Z",
"modified": "2018-03-13T13:50:08.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/73c3d7970dea0238c98275f925f18d4f3a66237a6b270a2732cca31193612f90/analysis/1520439216/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d710-9b64-4db9-9b9a-475102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d710-5924-439b-9812-402902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:13:36",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d710-c834-46d6-a679-4d2502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--67d15086-8265-4536-835f-eacf118dbdcf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:11.000Z",
"modified": "2018-03-13T13:50:11.000Z",
"pattern": "[file:hashes.MD5 = 'a755452d568062234058f69114bf3ee2' AND file:hashes.SHA1 = 'cab8950cc622639eea40ffcc0356d22fc8d0cac0' AND file:hashes.SHA256 = 'b4b6baca1104b0dbb289731c3b206cfeaefe58a23f45182e0d4f44069a7f5f39']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4934a6eb-4335-4e88-ac95-11ec7ce3d651",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:10.000Z",
"modified": "2018-03-13T13:50:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b4b6baca1104b0dbb289731c3b206cfeaefe58a23f45182e0d4f44069a7f5f39/analysis/1514997403/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d712-d574-40c7-b05a-42b102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d712-58d8-432d-8a59-442c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 16:36:43",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d712-1c0c-4608-b9ec-435002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--914b8dcb-39b8-41e6-9314-701cb1685d55",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:15.000Z",
"modified": "2018-03-13T13:50:15.000Z",
"pattern": "[file:hashes.MD5 = 'fa7c4c891eeea64acb6b517da7cf2615' AND file:hashes.SHA1 = '861fd776cdad3147e66cd7318c5656fabae5d310' AND file:hashes.SHA256 = 'd2b3946be545c3da30e779f60e73db1796073d6ca5ebef49a7cea7a75169cabf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c3b196f2-3089-4461-9f1e-e2ded8cc54fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:13.000Z",
"modified": "2018-03-13T13:50:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d2b3946be545c3da30e779f60e73db1796073d6ca5ebef49a7cea7a75169cabf/analysis/1515019336/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d715-debc-4755-88d5-48f002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d716-5e9c-4856-a379-455602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 22:42:16",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d716-3af0-4318-a461-40d902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d2a0d57f-8bd4-4f7a-bd2f-558d1ccc9e42",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:17.000Z",
"modified": "2018-03-13T13:50:17.000Z",
"pattern": "[file:hashes.MD5 = 'b53ef9daae55e9850bd5c41f7ef4ea38' AND file:hashes.SHA1 = 'f4e221406d2339df73b44edb795e426b8024ee93' AND file:hashes.SHA256 = 'c097751002442abbcb8c85e5df07d64fae35c03789a4dfe364ffd3b5496891b4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--994a0748-7980-4a57-a95b-2ea57fd7169c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:15.000Z",
"modified": "2018-03-13T13:50:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/c097751002442abbcb8c85e5df07d64fae35c03789a4dfe364ffd3b5496891b4/analysis/1520440972/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d717-6124-47bd-b146-489002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d718-38b0-413d-9940-4c4602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:42:52",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d718-ba7c-4bdd-b629-48db02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--08a40cfc-aaa0-4762-9aec-343975e97a59",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:19.000Z",
"modified": "2018-03-13T13:50:19.000Z",
"pattern": "[file:hashes.MD5 = '36a9a7bd068cc0c894b71dd1f7a7ec24' AND file:hashes.SHA1 = 'f6a1b97bf7e19ba920ace5bf4991c4b94784d3f0' AND file:hashes.SHA256 = '24d67b732f5d7ef320f1ab4a301fa9bf610dd9a831926f0cde8d4bae1c286700']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7c08f3f9-329e-409a-b4e2-ee8071725fdd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:17.000Z",
"modified": "2018-03-13T13:50:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/24d67b732f5d7ef320f1ab4a301fa9bf610dd9a831926f0cde8d4bae1c286700/analysis/1517020329/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d719-3288-4240-b718-41cf02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "45/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d71a-ee04-48bc-a594-4c8802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-27 02:32:09",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d71a-ad80-4592-ae6a-4ede02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d9defefd-c657-4cd9-b750-a295b80285fa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:21.000Z",
"modified": "2018-03-13T13:50:21.000Z",
"pattern": "[file:hashes.MD5 = '1e6bbdfc4c78a748a1cdbd34a7def84b' AND file:hashes.SHA1 = '3867602cf0742a2c6c42f0e204dd653fb80b5d50' AND file:hashes.SHA256 = '4f3cfee867adf239e4637a845b991edd4e523aa525101875492273f913013a56']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--70c8bcb8-ca3d-4852-b4aa-8638899816c6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:20.000Z",
"modified": "2018-03-13T13:50:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4f3cfee867adf239e4637a845b991edd4e523aa525101875492273f913013a56/analysis/1520438461/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d71c-1b9c-42f7-a941-411f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d71c-ec78-490f-a6bd-4fd102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:01:01",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d71c-2f24-4e7f-ba80-4fb302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c227e4dc-e420-45cb-9f53-1126208d93ed",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:24.000Z",
"modified": "2018-03-13T13:50:24.000Z",
"pattern": "[file:hashes.MD5 = '3bbbd82c039133da3e0b778c3aa5d041' AND file:hashes.SHA1 = '392aeb8bae8e3c66a5a70386214e084c9158c04d' AND file:hashes.SHA256 = '5b78f940c8376754517bfab8ca6ec1ebf978e5d32deef002a1715b39646a3407']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--cbca6d38-3a3d-4c08-bec0-22e39f71f2eb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:22.000Z",
"modified": "2018-03-13T13:50:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5b78f940c8376754517bfab8ca6ec1ebf978e5d32deef002a1715b39646a3407/analysis/1520868360/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d71e-101c-47d7-85d8-454502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d71e-5864-4894-82c9-4a3e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 15:26:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d71e-fc30-43f6-927b-4e8a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ddc8833c-f045-429a-9866-12bc325e4a8d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:26.000Z",
"modified": "2018-03-13T13:50:26.000Z",
"pattern": "[file:hashes.MD5 = 'adaf5a1f3605fcb4e8fc28f0be63d211' AND file:hashes.SHA1 = '2a1c26af0ebc33d2b96983d3da08e638b0c7be60' AND file:hashes.SHA256 = '4f268fc02c92d31707c728858c295b61c1a199296001e90e7a40bf56ed7d9faf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8f991164-986e-4588-84a1-017fc4940631",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:24.000Z",
"modified": "2018-03-13T13:50:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4f268fc02c92d31707c728858c295b61c1a199296001e90e7a40bf56ed7d9faf/analysis/1520438434/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d720-0958-4203-bceb-431f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d721-93bc-40cb-be04-4e3f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:00:34",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d721-7d04-4f77-b1ee-443b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--413a18c9-945a-4bd1-b541-691bc530c2fa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:28.000Z",
"modified": "2018-03-13T13:50:28.000Z",
"pattern": "[file:hashes.MD5 = 'd939f16bc039deefba9dd3cc06d925d2' AND file:hashes.SHA1 = '43df8874c41470f24eebf0c31e704c1845fe9f00' AND file:hashes.SHA256 = '1c980aba3c079b000d2a3c3431aaae37a34949d40c6e4d41721d06b53983d6d5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7e632066-66c8-4b57-844b-3e57c53c0644",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:26.000Z",
"modified": "2018-03-13T13:50:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/1c980aba3c079b000d2a3c3431aaae37a34949d40c6e4d41721d06b53983d6d5/analysis/1520376506/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d722-336c-42af-a11c-411302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d723-0708-4d5a-b69a-46a302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:26",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d723-3cb0-4bbd-b1e4-409602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5cf33f8d-dd97-4611-8b61-97b2763a0bd8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:30.000Z",
"modified": "2018-03-13T13:50:30.000Z",
"pattern": "[file:hashes.MD5 = '86f0f3b5b9f0ae67db3134f16f0c5596' AND file:hashes.SHA1 = '3a58ed052a301a1356c91f2d97d295d021dca68f' AND file:hashes.SHA256 = '6ab56fdc5593974aaea168539cdf70b33e0e18149a335d0762436f8d7cdec3ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b267d777-f810-4701-b57b-47643fe6e370",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:28.000Z",
"modified": "2018-03-13T13:50:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/6ab56fdc5593974aaea168539cdf70b33e0e18149a335d0762436f8d7cdec3ca/analysis/1520903160/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d725-2264-4baa-86d2-427102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d725-f5b0-4a5f-a1df-4c3e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 01:06:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d725-38a8-4f7c-a10c-416102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8a341ca2-f68a-45ed-9c09-cacdac4e43ba",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:32.000Z",
"modified": "2018-03-13T13:50:32.000Z",
"pattern": "[file:hashes.MD5 = '6c9dffa4318bd0f16b9684d6e49cda45' AND file:hashes.SHA1 = '6f865523b837c73b94fa9037106c525c89297898' AND file:hashes.SHA256 = '84639a788cc03eb09efb7c1b60883c37e5ac06eff0bff6d38022d64bf56f2330']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--949361d6-c71c-4ab9-b3b2-5fdef6a8549a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:31.000Z",
"modified": "2018-03-13T13:50:31.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/84639a788cc03eb09efb7c1b60883c37e5ac06eff0bff6d38022d64bf56f2330/analysis/1520439585/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d727-1e38-4af5-ad3d-4b5502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d727-7430-428a-9d57-4e3502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:19:45",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d727-d7bc-42f0-bde1-45d202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--05e14172-6a5f-4438-9cf9-18601485fee8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:35.000Z",
"modified": "2018-03-13T13:50:35.000Z",
"pattern": "[file:hashes.MD5 = '3257ebbe62c168281fa49bf95de6a8fb' AND file:hashes.SHA1 = 'a6e0a6576eff5098f3ea02b3bb229eae11fc9c86' AND file:hashes.SHA256 = '659842f05b708a081d9f1e47317dcd1c5e4ffc09d00c3cb9a06de966ff429839']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--718abdcd-3f1f-4652-9751-33a11b262a4b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:33.000Z",
"modified": "2018-03-13T13:50:33.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/659842f05b708a081d9f1e47317dcd1c5e4ffc09d00c3cb9a06de966ff429839/analysis/1520840315/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d729-1a78-4462-a049-449e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d72a-69c8-4ae1-8b44-49de02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 07:38:35",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d72a-c3a8-440b-9130-41c302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ac9429a8-1a38-443b-ac79-947e77c20362",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:37.000Z",
"modified": "2018-03-13T13:50:37.000Z",
"pattern": "[file:hashes.MD5 = '54841887d7bad7c3eecb7d9261d41b72' AND file:hashes.SHA1 = '8db7b1706d9eb83cf05418b3bfba65882e66475c' AND file:hashes.SHA256 = '54b8b75b4714b1902e0bd46dcc14877b6a329e88ef7068a2855710b39ea7d13d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--64350fec-6cfd-440f-82ca-f42b591d4a6e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:35.000Z",
"modified": "2018-03-13T13:50:35.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/54b8b75b4714b1902e0bd46dcc14877b6a329e88ef7068a2855710b39ea7d13d/analysis/1520903880/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d72c-6aa8-4375-a641-45fc02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d72c-bab8-48c4-abbb-40bc02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 01:18:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d72c-0784-4210-aa8d-42a502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--22d8e158-223c-4edb-b351-461809ff16af",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:39.000Z",
"modified": "2018-03-13T13:50:39.000Z",
"pattern": "[file:hashes.MD5 = '24309e61b949da868ea5f31b3f064c40' AND file:hashes.SHA1 = '18d64a9b1df49ccabc13344cbf57e94ae3f4b185' AND file:hashes.SHA256 = 'b044fd1e0ae000eeb04d0529b3920a38f839e910bfb6bb9d0837da22f0ace15e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d8c73c7c-20f0-4816-8447-5bfa171455f8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:38.000Z",
"modified": "2018-03-13T13:50:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b044fd1e0ae000eeb04d0529b3920a38f839e910bfb6bb9d0837da22f0ace15e/analysis/1517765294/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d72e-52d0-47fc-9955-46b902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d72e-ee74-4620-917c-449702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-04 17:28:14",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d72e-ba80-4ca6-ab29-4d9b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bc5863ac-57aa-4555-91f3-f8cddfd3a380",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:41.000Z",
"modified": "2018-03-13T13:50:41.000Z",
"pattern": "[file:hashes.MD5 = '13b32557ffd89f5b79e73c235bb242f5' AND file:hashes.SHA1 = '5f3af6334f2518cf32c7e4dda4e0d1b513c3dd91' AND file:hashes.SHA256 = '9b48f0818738ddda0adce3560770e8618dac6bd341d5e116d967562146d51a7f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fd565702-5854-489b-9168-aa56033b44b8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:40.000Z",
"modified": "2018-03-13T13:50:40.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9b48f0818738ddda0adce3560770e8618dac6bd341d5e116d967562146d51a7f/analysis/1520440176/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d730-f190-4ec3-a5ce-43ed02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d730-70ac-4f3b-b189-4e1f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:29:36",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d730-d848-45fb-b064-4a3a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--37650bda-445d-45fc-89bf-25645506db23",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:44.000Z",
"modified": "2018-03-13T13:50:44.000Z",
"pattern": "[file:hashes.MD5 = 'c7298cde42f023b0a6a15866aa61b7fb' AND file:hashes.SHA1 = '26cf4a9de1200db0bf6c7f7392824aff07472ae2' AND file:hashes.SHA256 = '44f52e01e59940e2d22a7b6473a76fc8bf326c4981fa4dea0f63234e62e151ad']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--adf2edf5-1bf0-43ce-bb48-03b0d632410f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:42.000Z",
"modified": "2018-03-13T13:50:42.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/44f52e01e59940e2d22a7b6473a76fc8bf326c4981fa4dea0f63234e62e151ad/analysis/1520438355/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d732-2cac-4bc3-b467-4c1102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d733-9b98-42cc-953a-460c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:59:15",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d733-2590-4b78-9792-4b6102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--12a9552f-dcfa-4b1b-b9a0-8577c5f592d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:46.000Z",
"modified": "2018-03-13T13:50:46.000Z",
"pattern": "[file:hashes.MD5 = '0ae7629d3b3da9932f96e86b79ae7cb1' AND file:hashes.SHA1 = '02283942656fe875594bcaa03f779f22f428ea3b' AND file:hashes.SHA256 = 'e97db554bb5fe030afb67f0a683857d124e7e05942f6d77b637056758ac0a4c1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--996697de-50d0-4c27-ae0b-f7cf1d789da0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:44.000Z",
"modified": "2018-03-13T13:50:44.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e97db554bb5fe030afb67f0a683857d124e7e05942f6d77b637056758ac0a4c1/analysis/1510451259/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d735-d530-4502-a06d-4bd402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d735-ff5c-4f0e-9d66-4ae902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-12 01:47:39",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d735-d950-4f76-9e96-4d5f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dc1da79a-987b-4226-998b-f6befaa03fb8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:48.000Z",
"modified": "2018-03-13T13:50:48.000Z",
"pattern": "[file:hashes.MD5 = 'fa3c6c48586890058c662a00fcff4e42' AND file:hashes.SHA1 = '94cbab468d20f0b010c2c09656f4ae66a6eb69c8' AND file:hashes.SHA256 = '836f470f458f72ffe7d9cb3de221ca9cacd2fccb1d209a3d11f30cf6304556ce']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1456abf1-55d0-43f6-9a4f-e91acc35882e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:47.000Z",
"modified": "2018-03-13T13:50:47.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/836f470f458f72ffe7d9cb3de221ca9cacd2fccb1d209a3d11f30cf6304556ce/analysis/1508511928/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d737-d834-461b-8ba7-439a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/65",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d737-1fe8-4d33-a304-495002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-10-20 15:05:28",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d737-3240-4fb2-80b9-4a6302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4775ae1d-ebf4-42ae-88cb-2d9e7b7e3485",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:51.000Z",
"modified": "2018-03-13T13:50:51.000Z",
"pattern": "[file:hashes.MD5 = '9a59b37a50a5a79fc009edac7e50393a' AND file:hashes.SHA1 = '82d52d1f87cf6bb0eb7c9f342807388b987469d5' AND file:hashes.SHA256 = '7e10cc1030d10939aa05cbd498f74381e0770fa5418b574c42fa9628003d5fdd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:51Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--81d57356-7bd7-44dd-99fe-a227e1ac00ab",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:49.000Z",
"modified": "2018-03-13T13:50:49.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7e10cc1030d10939aa05cbd498f74381e0770fa5418b574c42fa9628003d5fdd/analysis/1519135750/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d739-a2d8-42b5-9920-439f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "53/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d739-d0f4-4077-bb8b-481c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-20 14:09:10",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d739-ec88-4714-afb7-4c6c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d8f022d-7e99-4d4b-9999-3c7bb3331ded",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:53.000Z",
"modified": "2018-03-13T13:50:53.000Z",
"pattern": "[file:hashes.MD5 = '3944464c989438ff54697b4e190c9b19' AND file:hashes.SHA1 = 'e0c315a7c217cb7cace5f307e5e1ea4d3761f899' AND file:hashes.SHA256 = 'e31f26fbb1265cef7403c4204fe2d47cf27617a6f9e166b2416cbffdafe34a28']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--720e4a35-25aa-4682-91b8-74d26d2c83ae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:51.000Z",
"modified": "2018-03-13T13:50:51.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e31f26fbb1265cef7403c4204fe2d47cf27617a6f9e166b2416cbffdafe34a28/analysis/1520488405/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d73b-9c20-4385-9820-42cf02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d73b-62a4-491d-bf67-47cf02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:53:25",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d73c-3408-4c8a-8259-480202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c0993f0e-c4c9-4607-8438-5f67688c20d6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:55.000Z",
"modified": "2018-03-13T13:50:55.000Z",
"pattern": "[file:hashes.MD5 = 'd948825d710c020e52fbac6225538d19' AND file:hashes.SHA1 = '1dfb4e575bf305e340bd7e323ee922df6b7f55cf' AND file:hashes.SHA256 = '15ab4446504c9510fe377fb8657f9b4b67935c2aedd725058c1a15bf446a4015']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3ce18542-570a-4988-b75b-702cfa1a3c1a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:53.000Z",
"modified": "2018-03-13T13:50:53.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/15ab4446504c9510fe377fb8657f9b4b67935c2aedd725058c1a15bf446a4015/analysis/1520913240/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d73d-a92c-408e-9731-449402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "53/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d73e-561c-4321-8363-41fb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:54:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d73e-7408-4d06-9784-446202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--97971b0a-3559-409a-94ce-36fb05fbf4e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:57.000Z",
"modified": "2018-03-13T13:50:57.000Z",
"pattern": "[file:hashes.MD5 = '8ac83e9e242038e9f8a2c43f8746cb0a' AND file:hashes.SHA1 = '802e63b863cb3c1e2fc47bf5760a4b40b786542b' AND file:hashes.SHA256 = '65f4b673130e7858063199c89cf12a100484bd4f1588eedc01ea9c46e2d7e11e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1627866d-dabf-4069-bbe2-355f3f0a9647",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:55.000Z",
"modified": "2018-03-13T13:50:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/65f4b673130e7858063199c89cf12a100484bd4f1588eedc01ea9c46e2d7e11e/analysis/1513708624/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d740-29dc-47bd-b87d-4c8d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d740-5664-49a6-b09e-4c9202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-19 18:37:04",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d740-09d0-4c4a-8ba6-4e9702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0fa0b818-b2b2-482a-8567-cc8996d54f49",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:59.000Z",
"modified": "2018-03-13T13:50:59.000Z",
"pattern": "[file:hashes.MD5 = 'bbd86f3bf3efc9d5804eea574473bd43' AND file:hashes.SHA1 = '182d10f18270ab023d874784bcb221ccf96597a1' AND file:hashes.SHA256 = '3235914dde70f5f23899489bee7880fc5c121e28442e0349dcb7e266f2aab595']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:50:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--816947c3-4298-4ae3-bb19-8e2b8986ad81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:50:58.000Z",
"modified": "2018-03-13T13:50:58.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3235914dde70f5f23899489bee7880fc5c121e28442e0349dcb7e266f2aab595/analysis/1517469628/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d742-565c-4258-a347-485f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d742-10c4-4a47-991d-459d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-01 07:20:28",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d742-76d8-453f-b7ad-4c3202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--66f170fb-5db2-4ede-ad9b-121ba032c974",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:02.000Z",
"modified": "2018-03-13T13:51:02.000Z",
"pattern": "[file:hashes.MD5 = '5fc0c8777cb1ac9ffd24a8b14925e265' AND file:hashes.SHA1 = '68831c665856c0505e52d1ccaba4ab6868175809' AND file:hashes.SHA256 = '43119f84aab92fb79d14eab9e40bea78f0793ae323be7cce04130b65f2861b5e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6af3ebc6-434f-441d-ae40-b876937c8612",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:00.000Z",
"modified": "2018-03-13T13:51:00.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/43119f84aab92fb79d14eab9e40bea78f0793ae323be7cce04130b65f2861b5e/analysis/1520438302/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d744-763c-4c5d-943c-4cf402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d745-fe58-4057-80c0-479302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:58:22",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d745-c180-4aca-9b2c-4a8902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--21046835-1b5f-454d-8fa7-a0d11e43314a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:04.000Z",
"modified": "2018-03-13T13:51:04.000Z",
"pattern": "[file:hashes.MD5 = '1f45f5b5138763586539409bcaaa9d0d' AND file:hashes.SHA1 = '6c2a298e0e0edb4b2750bffa6b04b8d1cdf0b90c' AND file:hashes.SHA256 = '3c8336cc1d90a6bda731cd722bf83b41c7e67ea124db190cbee93f5e93f0aa29']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5ffcf6a5-9852-4f0e-a619-c557f9bafee2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:02.000Z",
"modified": "2018-03-13T13:51:02.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3c8336cc1d90a6bda731cd722bf83b41c7e67ea124db190cbee93f5e93f0aa29/analysis/1520488279/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d747-fe90-4f74-85ad-4b9a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d747-ec9c-4530-83c7-494b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:51:19",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d747-8398-4619-96f4-4eea02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bc18d46f-3297-462b-bcd7-6db52efaf56b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:06.000Z",
"modified": "2018-03-13T13:51:06.000Z",
"pattern": "[file:hashes.MD5 = '13a49a2d267d7e96a9e10b5e0e1b2adf' AND file:hashes.SHA1 = '7757c380a9238d80a064e7e158abf7b55c2f8191' AND file:hashes.SHA256 = '15077e348ae73659d6421d206fa34055710689deeac1bb2d1c41d7a52adda610']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fe44dcc1-5471-4572-aebc-7fc43c58831b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:05.000Z",
"modified": "2018-03-13T13:51:05.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/15077e348ae73659d6421d206fa34055710689deeac1bb2d1c41d7a52adda610/analysis/1518213343/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d749-9f04-421b-9ac9-443002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d749-c484-4570-a66d-432102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-09 21:55:43",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d74a-55a8-4d62-a4ed-404a02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9bff3672-c80a-4c16-b2cf-35a63fe86433",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:09.000Z",
"modified": "2018-03-13T13:51:09.000Z",
"pattern": "[file:hashes.MD5 = '45fde170eec6aca0c6db4c4044343e23' AND file:hashes.SHA1 = '8591d082074590978cf8477a727a72a19dd027a7' AND file:hashes.SHA256 = 'a52192465084e717ab601dda5a7d7f55530bdc206c84f634cc12467aede8c6c8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:09Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8670cf25-98a7-42aa-9cc2-e2e9d90a037a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:07.000Z",
"modified": "2018-03-13T13:51:07.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a52192465084e717ab601dda5a7d7f55530bdc206c84f634cc12467aede8c6c8/analysis/1520850540/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d74b-0618-4e2c-a3c2-4d3e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d74c-31f0-44bc-9187-48b402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 10:29:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d74c-4950-4053-98a4-4fd202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4225cb42-201f-47ed-ad03-c0f4543cb253",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:11.000Z",
"modified": "2018-03-13T13:51:11.000Z",
"pattern": "[file:hashes.MD5 = '150c7891677c165c26418fb313cf33d0' AND file:hashes.SHA1 = '4fe88dba4bbedab222c2276b85d9fd6171403373' AND file:hashes.SHA256 = 'b221d49022a39106207a6630db8a135d1803178b9d7e536525979c578184f752']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--26451a75-cc08-4fbc-87da-436e2cde572f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:10.000Z",
"modified": "2018-03-13T13:51:10.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b221d49022a39106207a6630db8a135d1803178b9d7e536525979c578184f752/analysis/1520499264/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d74e-8a9c-4b17-918a-4a3202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "22/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d74e-08a0-4e57-b9f3-410102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 08:54:24",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d74e-ab00-489c-bb30-489302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e43eb2dd-268c-4940-a19c-8c059cee8e40",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:14.000Z",
"modified": "2018-03-13T13:51:14.000Z",
"pattern": "[file:hashes.MD5 = '22d013541f27c6b017f805caedc7e1b0' AND file:hashes.SHA1 = 'f78e584d918e74e8e7ff343a8801b50324374cae' AND file:hashes.SHA256 = 'ad2cddbefebafe1b676c5429ce39ab46cb7cb947fa7f4ce4437e2bf8dc177cb5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c336794f-46a9-4009-b240-e5cad850bb96",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:13.000Z",
"modified": "2018-03-13T13:51:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ad2cddbefebafe1b676c5429ce39ab46cb7cb947fa7f4ce4437e2bf8dc177cb5/analysis/1514987176/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d751-4fec-440d-816c-41b402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d752-c8bc-4856-b01f-473302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 13:46:16",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d752-e6c4-44ae-a5c9-411c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--da460413-76f6-41a0-a2b8-1542e365d0fb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:17.000Z",
"modified": "2018-03-13T13:51:17.000Z",
"pattern": "[file:hashes.MD5 = 'd38bf4f8675fc8e27d533e6c489bac03' AND file:hashes.SHA1 = 'ede200073e2e9db262b255a1fbe7bf61c5436075' AND file:hashes.SHA256 = 'e08f1f54620bafe44200b3e12177e6a934e2d27910125144aec9606b68d44a88']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0677e0d0-8a8b-4754-bb9e-68525e65a9d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:15.000Z",
"modified": "2018-03-13T13:51:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e08f1f54620bafe44200b3e12177e6a934e2d27910125144aec9606b68d44a88/analysis/1519360614/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d754-84f4-4e39-859d-404002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d754-9afc-4515-b143-438402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-23 04:36:54",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d754-4a74-4522-b8c6-4ea702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0b4ad0cd-6a11-4eb2-a62e-85f88be78b2a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:19.000Z",
"modified": "2018-03-13T13:51:19.000Z",
"pattern": "[file:hashes.MD5 = '9ce80da250a8eddd660d36a050c71b82' AND file:hashes.SHA1 = '92d149b1776c35ddd8255b075e3a74b9ceb7c117' AND file:hashes.SHA256 = 'b2b0fe8835f5cb0a941b876b48d7fda262b85b6fec15436e48fdd2003ed914d4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--49f5f1f3-16d8-4061-b055-0b6335db369b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:18.000Z",
"modified": "2018-03-13T13:51:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b2b0fe8835f5cb0a941b876b48d7fda262b85b6fec15436e48fdd2003ed914d4/analysis/1520870356/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d756-e400-4efc-9138-40a002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d756-f984-406b-aa00-465e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 15:59:16",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d756-6ac0-4f92-b8e5-4fed02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--40314b91-c2b2-4eee-9c6b-2fe46238896e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:22.000Z",
"modified": "2018-03-13T13:51:22.000Z",
"pattern": "[file:hashes.MD5 = '6a870a4a3f63dc596865f2c8d98ea84e' AND file:hashes.SHA1 = '3997c797e07f5ae9a62443ee88b8d56d23b8f3fb' AND file:hashes.SHA256 = '73273151aa0dbe419d1564522a17d408d6b4fdf447571f323558b7e806e52d9d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6e14b2cc-41af-4ef4-8810-6dcf339bcfcf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:20.000Z",
"modified": "2018-03-13T13:51:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/73273151aa0dbe419d1564522a17d408d6b4fdf447571f323558b7e806e52d9d/analysis/1520439190/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d758-0bb0-494e-8081-4e5302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d759-1340-4157-826c-43cf02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:13:10",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d759-c414-41aa-8aa4-4dc602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8823252f-4421-4a25-b020-6c4d71b72f3c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:24.000Z",
"modified": "2018-03-13T13:51:24.000Z",
"pattern": "[file:hashes.MD5 = 'e01552ea0cc476f3dbf67ff088d93b85' AND file:hashes.SHA1 = '091e925e7a18461331a5e5d000a0b535fc805410' AND file:hashes.SHA256 = 'eeca7f0a6bcb9132e9ada7c8913aa39eb87aed9955dcc7f870f7c85a3f415362']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--70eb97ff-b5cf-4a33-9c55-b66c838dc136",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:22.000Z",
"modified": "2018-03-13T13:51:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/eeca7f0a6bcb9132e9ada7c8913aa39eb87aed9955dcc7f870f7c85a3f415362/analysis/1460569226/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d75a-4274-4fcc-a56f-458202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/57",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d75b-430c-48ac-999d-448102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2016-04-13 17:40:26",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d75b-b898-4b91-a074-44d402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4c585e51-1879-481c-a50b-8ecef2fbfee3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:26.000Z",
"modified": "2018-03-13T13:51:26.000Z",
"pattern": "[file:hashes.MD5 = '114fbf6ecc42b061ff1b28d34447a55e' AND file:hashes.SHA1 = 'af9780e3bcdd655a8b84feed50aef49d7b672037' AND file:hashes.SHA256 = '37da6dce2dd7ca03a502c53f0f8dec0c318184eefb694976bcc3aa6b5fa5a7de']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--13068af6-8ddc-4e99-a409-deda2159b103",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:25.000Z",
"modified": "2018-03-13T13:51:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/37da6dce2dd7ca03a502c53f0f8dec0c318184eefb694976bcc3aa6b5fa5a7de/analysis/1520931789/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d75d-3b1c-4d9b-8029-46ba02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d75d-5cc4-41f3-bc26-473b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 09:03:09",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d75d-5848-4465-aa26-42f302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--37a19c4b-d0e7-42c7-9611-445522921890",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:29.000Z",
"modified": "2018-03-13T13:51:29.000Z",
"pattern": "[file:hashes.MD5 = 'd8d90989579b967e0699c40b65d2f464' AND file:hashes.SHA1 = '2e02f9156c85f59701bdc7bb80f8f35ad721baee' AND file:hashes.SHA256 = 'b8b7b45988030666a9f63e7cfaba1a6d7dc5daff3e788a0afe5e375b55f982eb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--edcfd0af-4e00-4bf3-bfb2-f5e14e215c96",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:27.000Z",
"modified": "2018-03-13T13:51:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b8b7b45988030666a9f63e7cfaba1a6d7dc5daff3e788a0afe5e375b55f982eb/analysis/1490932474/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d75f-e384-431f-b2f9-430402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "45/62",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d760-771c-48fd-b990-460b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-03-31 03:54:34",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d760-fc70-4f1d-89a7-4bc902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1145dde9-b4a2-472a-9d5c-b9b6d48ed3a1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:31.000Z",
"modified": "2018-03-13T13:51:31.000Z",
"pattern": "[file:hashes.MD5 = '1231711812ceecce5163337c82aa1e7d' AND file:hashes.SHA1 = '99e2f9906d4480a1471853abb1755c44d414e749' AND file:hashes.SHA256 = 'cecc04094781c3d8440f54999d5b69e4ab7f4f2a3a0d6e85878ca60c0cafa34c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--06473880-41e8-46f2-b9c2-4cee0e116855",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:29.000Z",
"modified": "2018-03-13T13:51:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cecc04094781c3d8440f54999d5b69e4ab7f4f2a3a0d6e85878ca60c0cafa34c/analysis/1520872920/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d762-18d4-4bf0-9066-405602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d762-8a84-469e-b2d8-458802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 16:42:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d762-7d98-4899-9cde-4fd402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b3edef8c-598d-40e5-bb2d-18647024b51b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:33.000Z",
"modified": "2018-03-13T13:51:33.000Z",
"pattern": "[file:hashes.MD5 = '7ec94f92fa50786738fdc3cd2d071b07' AND file:hashes.SHA1 = 'd877d1a75035b35609954f5741c055e1bedd5d97' AND file:hashes.SHA256 = '01b623a37359246c634d3a4fbb423fe8f23bc8921a6719be6b0b93cd0e071253']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--fbbb0d5e-64de-4be0-90d7-a093afb63f88",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:32.000Z",
"modified": "2018-03-13T13:51:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/01b623a37359246c634d3a4fbb423fe8f23bc8921a6719be6b0b93cd0e071253/analysis/1520437177/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d764-17e4-4145-92a3-423b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d764-8e8c-4fb0-8c95-40ed02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:39:37",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d764-6ae8-4a86-8683-4c8c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9acd5c23-ef98-40a7-bfc9-caf28c3f23eb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:36.000Z",
"modified": "2018-03-13T13:51:36.000Z",
"pattern": "[file:hashes.MD5 = 'c3f531ada7d94b20f564516b565f12b7' AND file:hashes.SHA1 = '6c30ec71b15664585eebd093b696dc79351c7974' AND file:hashes.SHA256 = '67295af71bb23da8e045537784bd5af5ca7ad4aa742517a022022e9142e38a14']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--aed42feb-e540-4b67-961c-f67718df57a6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:34.000Z",
"modified": "2018-03-13T13:51:34.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/67295af71bb23da8e045537784bd5af5ca7ad4aa742517a022022e9142e38a14/analysis/1520488493/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d766-9e80-4a26-a1f1-448402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d766-b370-4222-b75c-459602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:54:53",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d766-9878-4b56-82f0-46d102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ab226ccc-8a64-436f-ad9a-9be4b5777b0f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:38.000Z",
"modified": "2018-03-13T13:51:38.000Z",
"pattern": "[file:hashes.MD5 = '5c45bdf8e2bcbca018725d062490be41' AND file:hashes.SHA1 = 'af9834e7e7888d2eec35efd15304f5698c1ea178' AND file:hashes.SHA256 = '4348b3da8a0a9df56a6a218f8ece0b313a04eb85446c58a2d5d0061baa5754f9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--44bf11f9-5d56-4ca4-882b-6702bcf34a30",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:36.000Z",
"modified": "2018-03-13T13:51:36.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4348b3da8a0a9df56a6a218f8ece0b313a04eb85446c58a2d5d0061baa5754f9/analysis/1519867407/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d768-0590-4de7-a37f-4e6602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "45/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d769-e034-429c-afb6-404802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-01 01:23:27",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d769-4274-45ae-8222-490402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--927f792b-19a9-4c29-82a9-b32675909be3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:40.000Z",
"modified": "2018-03-13T13:51:40.000Z",
"pattern": "[file:hashes.MD5 = '9ac9a4db59d086d1d8abe08829766e81' AND file:hashes.SHA1 = '2200dfae4b82ed13b0f6c1c0ba7ac574fcc744e5' AND file:hashes.SHA256 = '7a2629e3505686c623cc001e684a95652b8ad7b8a8a697a106c116acdc25e421']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0d77908a-f0f7-4781-97d2-246bdbee37ec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:38.000Z",
"modified": "2018-03-13T13:51:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7a2629e3505686c623cc001e684a95652b8ad7b8a8a697a106c116acdc25e421/analysis/1517381672/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d76b-6fe0-47e3-b720-4f8702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d76b-459c-42dc-a115-4a9102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-31 06:54:32",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d76b-4860-4d73-8ef9-43a802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7a0a06e2-e651-4fd1-a48b-4b88352b1c4f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:42.000Z",
"modified": "2018-03-13T13:51:42.000Z",
"pattern": "[file:hashes.MD5 = '38135d60e9edcfe413aeb7549b6e7f38' AND file:hashes.SHA1 = 'a5e2302fef562aa54ad801b2fd19a33465f3915e' AND file:hashes.SHA256 = '2da98e19b1642bd55ea8365795f030789508cd88fbef81ce16877436ea2c1484']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1ecae68a-3fa0-46b5-9a9c-4ef390e211bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:41.000Z",
"modified": "2018-03-13T13:51:41.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/2da98e19b1642bd55ea8365795f030789508cd88fbef81ce16877436ea2c1484/analysis/1520437873/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d76d-dd20-4623-b610-4cb502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d76d-625c-423f-9d40-41dc02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:51:13",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d76d-0fb0-4311-9eca-4e3002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1c2f9b9e-1a6f-42bd-93ea-8b0df438103a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:45.000Z",
"modified": "2018-03-13T13:51:45.000Z",
"pattern": "[file:hashes.MD5 = '9ab3d830514a2619ae98d4449cf08860' AND file:hashes.SHA1 = '3b2974b7901f51dd935a0a606e7ce221565518d0' AND file:hashes.SHA256 = 'b964569f2697dcb72fd36076744995eec99a35f056826b6aab2c929e908d48ba']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ffb0fd88-2cc2-46da-869b-788448ed5ca4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:43.000Z",
"modified": "2018-03-13T13:51:43.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b964569f2697dcb72fd36076744995eec99a35f056826b6aab2c929e908d48ba/analysis/1520440761/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d76f-0ca8-47e5-beba-472402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d770-7a18-4d0c-ad83-459f02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:39:21",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d770-94b8-4e5b-ae09-400c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--80c4fd2c-a08f-4ba7-bc29-6e29ea981bd0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:47.000Z",
"modified": "2018-03-13T13:51:47.000Z",
"pattern": "[file:hashes.MD5 = '8752234ea0813c90a867cae0a15f26a7' AND file:hashes.SHA1 = '15883c196f0bad6fa225924faabe5656f1d62121' AND file:hashes.SHA256 = 'af392fe93ca1e02fa5c12284dab4a3c3f8eda251c86be8b1c54b8d6486c91242']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--42229f3c-506e-45d1-88d3-4e2c9f27ccad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:46.000Z",
"modified": "2018-03-13T13:51:46.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/af392fe93ca1e02fa5c12284dab4a3c3f8eda251c86be8b1c54b8d6486c91242/analysis/1520854200/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d772-6004-4acf-bd1d-4c0802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d772-5c6c-4063-a77b-478a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 11:30:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d772-d0dc-400f-a149-4a9902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d8aeabc-15b4-40f9-9bc1-7b07df4455b7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:50.000Z",
"modified": "2018-03-13T13:51:50.000Z",
"pattern": "[file:hashes.MD5 = '314e533e5f7af75fcb0da934290ae6e1' AND file:hashes.SHA1 = '51575e91aeb11ad7fafdc25983c50f587f5b4a56' AND file:hashes.SHA256 = '92121041f5102caa8e0d95a48c32161648fe54c0f839ec54c8faf1595b0ea3d3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c7f784cb-512a-4528-b270-ea27855f4166",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:48.000Z",
"modified": "2018-03-13T13:51:48.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/92121041f5102caa8e0d95a48c32161648fe54c0f839ec54c8faf1595b0ea3d3/analysis/1520488294/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d774-bdcc-4624-8d34-4e3602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d775-fd38-4c36-808a-4ddd02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:51:34",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d775-c57c-49c2-ab31-403802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--509e750c-3a95-40fa-ad9b-76f22cdc492b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:52.000Z",
"modified": "2018-03-13T13:51:52.000Z",
"pattern": "[file:hashes.MD5 = 'c753d246a1f9116f217ab26270608e2f' AND file:hashes.SHA1 = '67c050e935338a038e70999c4bd11932be4e7aa0' AND file:hashes.SHA256 = '57fdd5ceac9957edf992b03fb4f888d2d90991d1d8148f55f57c466127ea2e67']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--030a8ee8-106b-4afd-9a08-f135111ee17f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:50.000Z",
"modified": "2018-03-13T13:51:50.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/57fdd5ceac9957edf992b03fb4f888d2d90991d1d8148f55f57c466127ea2e67/analysis/1512544559/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d777-94f0-4cb8-95ce-481902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d777-5e28-48b6-8cb8-4d0302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-06 07:15:59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d777-9c44-4d13-93e8-4be002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8aea02c3-b7ab-4049-a7d0-574248ffc5ce",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:54.000Z",
"modified": "2018-03-13T13:51:54.000Z",
"pattern": "[file:hashes.MD5 = '7d3b215f3fa77a0e6bb20612aecbacfa' AND file:hashes.SHA1 = '771c75a24462f8eca232d23456b297b1dbce1f79' AND file:hashes.SHA256 = 'f703df08f5e7388f4873137977cf1c96a24293a7bf93b952c586c27b34e4212e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9fe05add-499d-4dd5-a632-7f6283f12006",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:53.000Z",
"modified": "2018-03-13T13:51:53.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f703df08f5e7388f4873137977cf1c96a24293a7bf93b952c586c27b34e4212e/analysis/1510366213/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d779-fbb0-4f26-8550-48b502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d779-3a10-40c7-b29d-406302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-11 02:10:13",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d779-a3ac-4a3d-94ac-46f102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9f4251f1-9409-47b5-a6ab-bb1b0eb81236",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:57.000Z",
"modified": "2018-03-13T13:51:57.000Z",
"pattern": "[file:hashes.MD5 = '81336760248faca7157bfd9c74b3f3f3' AND file:hashes.SHA1 = '90e0fb98c249ddad6010fcbd57aa6aef1c83cd00' AND file:hashes.SHA256 = '43c45ca9b13fc4b0a5c80b896e219ff376eb49d2ab9d3e2ddaa7a2e743e97289']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a6c66b4a-943b-4095-89fe-af13049c2857",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:55.000Z",
"modified": "2018-03-13T13:51:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/43c45ca9b13fc4b0a5c80b896e219ff376eb49d2ab9d3e2ddaa7a2e743e97289/analysis/1520438328/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d77b-a738-4998-a998-420602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d77b-c378-48ca-be69-4a0a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:58:48",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d77b-30a8-47e5-a8bc-407402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--627d360a-1b2e-450b-8fba-76deceb75528",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:59.000Z",
"modified": "2018-03-13T13:51:59.000Z",
"pattern": "[file:hashes.MD5 = 'd7d228cb41b18b621ffa2ca3275d11b8' AND file:hashes.SHA1 = '50182a063f53e2cf1c6b35cfaaaaab16c3ee8e9c' AND file:hashes.SHA256 = '64f64e84b753992054214453ffc55f0b04f8e424d2b7610dc134c75f7da899ee']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:51:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--04de7a55-7030-479a-9a54-1b3b5857a7cf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:57.000Z",
"modified": "2018-03-13T13:51:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/64f64e84b753992054214453ffc55f0b04f8e424d2b7610dc134c75f7da899ee/analysis/1520855880/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d77d-80e0-4367-952b-486202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d77e-4e98-48a0-be4f-445602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 11:58:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d77e-6900-4ea6-9fff-41e902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d34ba1e1-ea64-48da-8df2-4ac0c83d2174",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:01.000Z",
"modified": "2018-03-13T13:52:01.000Z",
"pattern": "[file:hashes.MD5 = '136c2578fdd33600a0a41f4e4f52ab9c' AND file:hashes.SHA1 = '4b5f0137640677356f0a93d09dde53ef7b9afd3c' AND file:hashes.SHA256 = 'b16db20a9a2e19b318d0ecfd8e9253e16499d8498156bcad684c39a9b3c37c4e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--64bec757-4f02-4661-be85-d133f1f916f4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:51:59.000Z",
"modified": "2018-03-13T13:51:59.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b16db20a9a2e19b318d0ecfd8e9253e16499d8498156bcad684c39a9b3c37c4e/analysis/1520446237/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d77f-7d48-494b-afd7-412f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d780-662c-49b3-9354-4a3302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 18:10:37",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d780-cbf0-4799-b407-4d9902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--95d5d4b0-6b7d-4606-aad5-deffead81484",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:03.000Z",
"modified": "2018-03-13T13:52:03.000Z",
"pattern": "[file:hashes.MD5 = '5f939d4c3cf1d668b0b9f74658659929' AND file:hashes.SHA1 = '72aff0a2268ae11aebf81e75ddf365ffd6cb6f99' AND file:hashes.SHA256 = '25708004887ea068f449e989bbbec07282d14c3ddd8cd03b4af492143a03f397']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8c3771ce-366b-4cfb-be18-490fef4a77e3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:02.000Z",
"modified": "2018-03-13T13:52:02.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/25708004887ea068f449e989bbbec07282d14c3ddd8cd03b4af492143a03f397/analysis/1520376422/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d782-e754-4302-8ac9-47c302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d782-074c-4f66-bdf3-4a3b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:02",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d782-bee4-4dfd-9cdc-455602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7e2b3829-7e79-4457-8c46-52cc0a4c135b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:06.000Z",
"modified": "2018-03-13T13:52:06.000Z",
"pattern": "[file:hashes.MD5 = '9d095bfe4e4de6a0ff97f683fb3355f1' AND file:hashes.SHA1 = '13e758afee7ee7fabbdb5191a3b699508a91e388' AND file:hashes.SHA256 = 'c39babff09e33d20d0d24c0ff68810aa593a22fd53f5da287991a7373446a8da']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7cfdff1a-969b-4132-81e2-91db2d53b935",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:04.000Z",
"modified": "2018-03-13T13:52:04.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/c39babff09e33d20d0d24c0ff68810aa593a22fd53f5da287991a7373446a8da/analysis/1511497778/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d784-9080-4298-8a51-4d0b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d785-ee3c-4c92-af47-412102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-24 04:29:38",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d785-c490-43d7-8418-46a402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6b7e96a4-c224-4cd4-9463-0a4abfe1310c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:08.000Z",
"modified": "2018-03-13T13:52:08.000Z",
"pattern": "[file:hashes.MD5 = 'f2e43e556ec1d89e283cd22af4d3fca9' AND file:hashes.SHA1 = '5f42072c970484a09da377c8bb3b2b651ba1696a' AND file:hashes.SHA256 = 'aeb1e902075da6dc2d2526751276cc6602c819bbea2e668e9dc3baaf9d177adc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6d78971f-8ac5-459a-8e28-61152f4387f6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:06.000Z",
"modified": "2018-03-13T13:52:06.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/aeb1e902075da6dc2d2526751276cc6602c819bbea2e668e9dc3baaf9d177adc/analysis/1520440471/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d786-90a0-401b-9c0b-470002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d787-f67c-4005-bf8e-472402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:34:31",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d787-f1f8-45be-8dcd-499302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6d443c89-c0fb-498b-b29c-f70a8e9b7441",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:10.000Z",
"modified": "2018-03-13T13:52:10.000Z",
"pattern": "[file:hashes.MD5 = '1b53dea2ba172b642f97cb46e3887cf0' AND file:hashes.SHA1 = '8ab18026388691d5c8a71213e565e0a62ec93739' AND file:hashes.SHA256 = '8587dda211ef94435a1ef9f1c4c299afacc179fd59fe06c74d3e75506d084277']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f7e1ca9a-c724-4270-b711-d7311d1bf670",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:09.000Z",
"modified": "2018-03-13T13:52:09.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8587dda211ef94435a1ef9f1c4c299afacc179fd59fe06c74d3e75506d084277/analysis/1520439611/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d789-3454-4bf0-a2ac-409702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d789-a4b0-4c87-80da-4cbd02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:20:11",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d789-2f00-4d8f-abb7-4c1602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8bed1326-1a1d-4928-8b15-a0b7ca1ee902",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:13.000Z",
"modified": "2018-03-13T13:52:13.000Z",
"pattern": "[file:hashes.MD5 = '0b5a3846890ffa967046bfba4a0d9426' AND file:hashes.SHA1 = 'e39fc468f9f4a5c2c0ba6e8ecf31c3700d7b3d37' AND file:hashes.SHA256 = '82b4da37d492b024b190fbbe30dc08b1d9b877f20fbce057ad1b1c0566421994']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--49292793-cd90-46f5-826e-83edb402829d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:11.000Z",
"modified": "2018-03-13T13:52:11.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/82b4da37d492b024b190fbbe30dc08b1d9b877f20fbce057ad1b1c0566421994/analysis/1513719622/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d78b-23ec-4db2-b0f2-410c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "43/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d78b-367c-4990-bce0-42ef02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-19 21:40:22",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d78b-9718-42b5-914e-4b5202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1bc2cce-a622-49f4-aeb8-5b953ef057bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:15.000Z",
"modified": "2018-03-13T13:52:15.000Z",
"pattern": "[file:hashes.MD5 = '76f9e428cef62823b24fef1027b0e1a1' AND file:hashes.SHA1 = 'b86f5bc56ec349271819792a85b4f906d7a6c5da' AND file:hashes.SHA256 = 'b930d8c294a10f76e7dc9fbe1b257142fa5abc4bea0bc51ef544117b4ad51e29']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--320498fb-361d-4be2-bf24-c44442ba1d43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:13.000Z",
"modified": "2018-03-13T13:52:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b930d8c294a10f76e7dc9fbe1b257142fa5abc4bea0bc51ef544117b4ad51e29/analysis/1520440735/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d78d-4ae0-478f-bc50-46d502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d78e-2ad0-4883-ac82-4e5502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:38:55",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d78e-0c3c-45e3-b8ce-40d602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--139c2340-d819-4e2a-b7ef-5db4b5456996",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:17.000Z",
"modified": "2018-03-13T13:52:17.000Z",
"pattern": "[file:hashes.MD5 = 'ac0067988b2c79c6981a9ba4f4c329f1' AND file:hashes.SHA1 = '32166fa4012c0ef3fe6028e30a12630a9974c5a4' AND file:hashes.SHA256 = 'f8002689fec2703e5560634aeaa89fabd96fba28316d31a41bf975f14ad1dfa6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--11fc4165-9256-452c-bd57-91eea67d52f7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:16.000Z",
"modified": "2018-03-13T13:52:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f8002689fec2703e5560634aeaa89fabd96fba28316d31a41bf975f14ad1dfa6/analysis/1520855340/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d790-fd6c-46ff-9b5a-4c3b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d790-599c-489d-bf66-459102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 11:49:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d790-63a0-44a6-82dd-42e402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9a4100e0-80fa-4c58-8ea4-c72ae84eabea",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:20.000Z",
"modified": "2018-03-13T13:52:20.000Z",
"pattern": "[file:hashes.MD5 = '741db18df23a7ae363be11bc3dbc8d67' AND file:hashes.SHA1 = '7e5cad51c1c13d97204b820575f4d292af494b68' AND file:hashes.SHA256 = '897b2f0c72cc89596f02d1d496578791677f61c4f1ef71aa2e784746479095bd']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--529f731b-28af-4b92-a2e5-02df29872815",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:18.000Z",
"modified": "2018-03-13T13:52:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/897b2f0c72cc89596f02d1d496578791677f61c4f1ef71aa2e784746479095bd/analysis/1520912416/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d792-a250-47b9-8c96-401702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d792-c528-4edd-a23b-472402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:40:16",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d792-d14c-4022-9516-4dd002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--136020bc-9d22-4ff9-8ecc-0593daa5cdc9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:22.000Z",
"modified": "2018-03-13T13:52:22.000Z",
"pattern": "[file:hashes.MD5 = 'cbbd9de8c1f52ee1f167a28a85623f4e' AND file:hashes.SHA1 = '0fd93fe0d0a56d293c29e52ba32d62ace7d67944' AND file:hashes.SHA256 = 'f1b2aad1a13527a4a420bf395f9aef9be0e024867ec07e7bb4ef142a5adaf1c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a0368a1c-1331-48d8-be77-72246033e74d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:20.000Z",
"modified": "2018-03-13T13:52:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f1b2aad1a13527a4a420bf395f9aef9be0e024867ec07e7bb4ef142a5adaf1c9/analysis/1510538879/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d794-be7c-4f26-b159-48d002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d795-cee8-4d67-aeb5-4e8402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-13 02:07:59",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d795-9538-4cd1-b57a-424102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--df75d959-0373-4dcb-9d03-661b2e89367d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:24.000Z",
"modified": "2018-03-13T13:52:24.000Z",
"pattern": "[file:hashes.MD5 = '3974f65ad10cb0f98f88cbefccb12d6a' AND file:hashes.SHA1 = '44bcaaeda395e40e9b8a2f6654268d8a781d19fc' AND file:hashes.SHA256 = 'e192c87072de321abd224a30c571207d986b882ec662da9c4ddf1b83d407eaa7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--dd4de532-cdff-43db-9b08-383978d10ecf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:22.000Z",
"modified": "2018-03-13T13:52:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e192c87072de321abd224a30c571207d986b882ec662da9c4ddf1b83d407eaa7/analysis/1515020267/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d796-8c00-481a-ae64-468802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "25/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d797-7204-438e-b905-45ce02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 22:57:47",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d797-8f78-419c-832d-4e5b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7cf04113-a5ef-4039-a3e1-ffe4ec7290a3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:26.000Z",
"modified": "2018-03-13T13:52:26.000Z",
"pattern": "[file:hashes.MD5 = '1157a7a75d7d16ed2aeb80e631d4f33a' AND file:hashes.SHA1 = '21714237b26c5002491c082928563c9a17d44100' AND file:hashes.SHA256 = 'a7b9ddd84fc86c1eb09feba86b773961cc1d459287eae364bbe750533ac5ceb9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b9d2a895-a418-495d-a507-6ed53e60da61",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:25.000Z",
"modified": "2018-03-13T13:52:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a7b9ddd84fc86c1eb09feba86b773961cc1d459287eae364bbe750533ac5ceb9/analysis/1520376463/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d799-b18c-47f1-9409-4ad402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d799-a0d4-4ca6-b418-49eb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:43",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d799-4634-4823-a3dd-4a0302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2921db48-769c-4001-86d0-7f439fd5895a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:29.000Z",
"modified": "2018-03-13T13:52:29.000Z",
"pattern": "[file:hashes.MD5 = '686c3aefcf126467b8c45beaf689cf50' AND file:hashes.SHA1 = '2819c5bc755a2af4eb682d669d15895347f0f246' AND file:hashes.SHA256 = '45fad51e141ab93a26df72010aab0c464da2979745b62066a5810e7b5dc370e1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--744bd821-f292-4972-a1c0-9ef1cb1501d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:27.000Z",
"modified": "2018-03-13T13:52:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/45fad51e141ab93a26df72010aab0c464da2979745b62066a5810e7b5dc370e1/analysis/1520911140/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d79b-5be8-455f-b45d-4d7c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d79c-7a44-4c16-9ee4-4e3d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:19:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d79c-7458-42a1-b0af-4bb102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3b4dddf3-912b-4a36-a71e-036980f6e913",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:31.000Z",
"modified": "2018-03-13T13:52:31.000Z",
"pattern": "[file:hashes.MD5 = 'f7995ceb2d17d635986fb76ba59fd122' AND file:hashes.SHA1 = '5e6ca17818ed8893b2e1098126fdc6821e2b2089' AND file:hashes.SHA256 = 'f144d58388ad6137c62581987da8dbb558e347670d79521898fb2b3084372963']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--7f3cc856-802d-426c-8c22-246dc019e2cb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:29.000Z",
"modified": "2018-03-13T13:52:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f144d58388ad6137c62581987da8dbb558e347670d79521898fb2b3084372963/analysis/1520903580/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d79e-e9e4-4d3b-b249-4e0c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d79e-74ac-49fb-a3b7-438302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 01:13:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d79e-bf98-41f1-837e-477902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e12bb0ee-a69a-4146-b055-56ca6d2cc0fc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:33.000Z",
"modified": "2018-03-13T13:52:33.000Z",
"pattern": "[file:hashes.MD5 = 'a3b605efefd8266d7e8d1051314604d9' AND file:hashes.SHA1 = '2bfd136652ed987c5b04d6a7295ed61bbfe39553' AND file:hashes.SHA256 = 'a6a8204b0fe9a34ec7c41a60a54a0d4af1d34d0bbda89c0828092a7a11226f0a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9489f5d2-ff71-4fd0-815d-78330163a252",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:32.000Z",
"modified": "2018-03-13T13:52:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a6a8204b0fe9a34ec7c41a60a54a0d4af1d34d0bbda89c0828092a7a11226f0a/analysis/1508031785/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7a0-e78c-42dc-8326-49cd02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7a0-ca94-40dc-8ee8-4a0902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-10-15 01:43:05",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7a0-bcd4-4274-98f4-436b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2176c24c-867e-4722-a4f3-93baf925f23b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:36.000Z",
"modified": "2018-03-13T13:52:36.000Z",
"pattern": "[file:hashes.MD5 = '939766d8b2c4b0110018d5b07661c518' AND file:hashes.SHA1 = '942ccb6006213f6ae488b3388662289ff9f645bb' AND file:hashes.SHA256 = '437f7e76026b069fd1a25f633f250418792c77e94f77cc2bb7b6d03b897b17b0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--01a3a067-3cd9-4ad4-9d0d-edcfaeff95e9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:34.000Z",
"modified": "2018-03-13T13:52:34.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/437f7e76026b069fd1a25f633f250418792c77e94f77cc2bb7b6d03b897b17b0/analysis/1516118226/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7a2-9de8-4112-acf6-410c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7a2-57d0-4512-bf61-43b002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-16 15:57:06",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7a2-5aac-4103-8274-41ff02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d99541c3-21f9-4e43-a072-f9f348acc61a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:38.000Z",
"modified": "2018-03-13T13:52:38.000Z",
"pattern": "[file:hashes.MD5 = '4c2b9f101e22a2908a81d8a7e0ac128d' AND file:hashes.SHA1 = '307d39be99b0046a24b10251cbed980695810886' AND file:hashes.SHA256 = '36ded192ad393efe6ede239ec44f3f92457ff3647a1c3f87eabc859db52c9575']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--004be45d-0741-4968-86ee-422470e10454",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:36.000Z",
"modified": "2018-03-13T13:52:36.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/36ded192ad393efe6ede239ec44f3f92457ff3647a1c3f87eabc859db52c9575/analysis/1520376512/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7a5-a3c0-4705-a3e3-444a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "57/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7a5-883c-472a-b038-46ac02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:32",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7a5-12ec-48e2-9d31-4cac02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d3259046-b495-487a-ba1b-213849af711b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:40.000Z",
"modified": "2018-03-13T13:52:40.000Z",
"pattern": "[file:hashes.MD5 = 'ef728ac92c9ab82f429b44af2b72446e' AND file:hashes.SHA1 = 'fe7a1fd692a86cda7bea9d8f59294c60318a70fb' AND file:hashes.SHA256 = '07d9637fff6a7974be99206e6b767653e3ceef2bd91531afa300e1430b8eb800']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--84bf6f44-a6f7-4787-b77a-8aa652de24d1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:39.000Z",
"modified": "2018-03-13T13:52:39.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/07d9637fff6a7974be99206e6b767653e3ceef2bd91531afa300e1430b8eb800/analysis/1520929871/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7a7-7308-474c-ae25-440502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7a7-73b4-4b0c-9b36-443002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 08:31:11",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7a7-2a7c-4f9f-81eb-4d5c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4b42b7ba-a997-4165-ba35-d68532e67774",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:43.000Z",
"modified": "2018-03-13T13:52:43.000Z",
"pattern": "[file:hashes.MD5 = '34138fc961bc84b3034d3cdff7983bba' AND file:hashes.SHA1 = '49a63665523c2c7e7e2e7e3709b7800cf251357f' AND file:hashes.SHA256 = '5f0028ccf2b04dc60b8589a1f66dfe0dd066bd6ee5a6b6dd2cda57e42270ef54']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--17a3fa4e-9caa-4187-a01f-829a2a81b273",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:41.000Z",
"modified": "2018-03-13T13:52:41.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5f0028ccf2b04dc60b8589a1f66dfe0dd066bd6ee5a6b6dd2cda57e42270ef54/analysis/1520438834/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7a9-bb18-4e22-a256-44f002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "27/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7aa-ba30-4914-9016-4d6402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:07:14",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7aa-5d44-4074-b3db-437202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--af041428-4279-46bf-93f7-95a9ae7e9ac0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:45.000Z",
"modified": "2018-03-13T13:52:45.000Z",
"pattern": "[file:hashes.MD5 = '340f57477a1e9b238ecc22ae4bb60b4f' AND file:hashes.SHA1 = 'c9d4dadcd7f6851d0a249274530ee09808f7b9c2' AND file:hashes.SHA256 = 'ed16e269224b7daeb5fb8aa5194543c3b300d5e9e916f1c00e268747c676247c']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a4eaa802-abe1-41ad-8dd3-d0ce3294cb7d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:43.000Z",
"modified": "2018-03-13T13:52:43.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ed16e269224b7daeb5fb8aa5194543c3b300d5e9e916f1c00e268747c676247c/analysis/1520376489/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7ac-a7e8-4b66-a134-443202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ac-704c-45ae-9fdf-491402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:09",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ac-ce30-4def-b11c-48aa02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--908010cd-28a0-4f08-a7a5-69281f864864",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:47.000Z",
"modified": "2018-03-13T13:52:47.000Z",
"pattern": "[file:hashes.MD5 = '07758b5ba4102f22c1c33c29d46ab896' AND file:hashes.SHA1 = 'd453bcc4be23a3d93253c1a060fb426cbcf42e10' AND file:hashes.SHA256 = '12596ccb9a77db49e5dd8c2b38779cdea41f78660c8a0b9d0ccd80bef004b2b6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d989e4a7-23b0-46e7-813f-00cdf793e023",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:46.000Z",
"modified": "2018-03-13T13:52:46.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/12596ccb9a77db49e5dd8c2b38779cdea41f78660c8a0b9d0ccd80bef004b2b6/analysis/1517233278/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7ae-55e8-4da1-8d61-49a002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ae-6690-4139-b056-4b2e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-29 13:41:18",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ae-f11c-4ffb-862d-404602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2df4ad14-cdee-402f-9b29-66314a34cfca",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:50.000Z",
"modified": "2018-03-13T13:52:50.000Z",
"pattern": "[file:hashes.MD5 = '22f5fc8c3b6d038df86bc8021f1de668' AND file:hashes.SHA1 = '4d32519479e1d66b2939a6ddb22faf22bae19a48' AND file:hashes.SHA256 = '1f14d6590c2f3434805d0967ba7bbb822ce7ec39a89b9b10f2a26d11176cc77a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ae6eff32-1af2-4531-9939-8eefe6ee25dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:48.000Z",
"modified": "2018-03-13T13:52:48.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/1f14d6590c2f3434805d0967ba7bbb822ce7ec39a89b9b10f2a26d11176cc77a/analysis/1520437631/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7b0-7a94-4f3f-a2a6-450b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7b0-03f8-4b7b-a87d-482302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:47:11",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7b0-c4d0-46b8-b133-406402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4ebe1cd8-46c9-4f31-a5df-525f4d91d446",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:52.000Z",
"modified": "2018-03-13T13:52:52.000Z",
"pattern": "[file:hashes.MD5 = '42ee3f01f1b974afddfff585e9954d63' AND file:hashes.SHA1 = '5657e0ed23b7e9c661a545d7c9e20d0fffae1129' AND file:hashes.SHA256 = '8911699cdd4ced8731dd4b0f5269f52073acab270bad78aa4d161aaa673e63f9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1c2bcd49-2485-4949-a704-8b12e30d65e3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:50.000Z",
"modified": "2018-03-13T13:52:50.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8911699cdd4ced8731dd4b0f5269f52073acab270bad78aa4d161aaa673e63f9/analysis/1520439719/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7b2-b0f0-4782-92bd-4ef802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7b3-b08c-4549-a9e1-490602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:21:59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7b3-7c58-41b1-ae83-444802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b0da95dc-a85b-498e-a0f0-679b8220ab3e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:54.000Z",
"modified": "2018-03-13T13:52:54.000Z",
"pattern": "[file:hashes.MD5 = '2962f9004b0de4c60e5d7f0019488649' AND file:hashes.SHA1 = 'bd5dc9a4ccdd955f9fd887e61b79119db650c414' AND file:hashes.SHA256 = '71b283a465e11cc51c5e6c2358c146ee2263c79c602efd12433e7abcab5d8934']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--11c2e221-8fef-48d6-a2d4-9699d52ca330",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:52.000Z",
"modified": "2018-03-13T13:52:52.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/71b283a465e11cc51c5e6c2358c146ee2263c79c602efd12433e7abcab5d8934/analysis/1520439163/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7b5-7e94-422a-9919-454202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "48/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7b5-8af0-4cb4-8505-4e3d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:12:43",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7b5-3a14-4afa-a21e-44cb02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--fac77102-1466-4b49-af45-0081aa168519",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:56.000Z",
"modified": "2018-03-13T13:52:56.000Z",
"pattern": "[file:hashes.MD5 = '361549029a91a9f00941115ab2ccc67f' AND file:hashes.SHA1 = '6b97abb22007c1ba7141df23e189aa2f74b346eb' AND file:hashes.SHA256 = '058f5a5091489fee86a000a55181e44d4acb5adc81bf709e506c972776cc76ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b430aab1-6ef2-4ec5-9720-0805c1640c39",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:55.000Z",
"modified": "2018-03-13T13:52:55.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/058f5a5091489fee86a000a55181e44d4acb5adc81bf709e506c972776cc76ca/analysis/1510365723/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7b7-8230-40e9-92b0-45d002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7b7-e0c4-4bf2-b601-4fbe02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-11-11 02:02:03",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7b7-3560-4a98-9d59-49a902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--45b7e720-e0f0-4621-89a8-be81720d360f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:59.000Z",
"modified": "2018-03-13T13:52:59.000Z",
"pattern": "[file:hashes.MD5 = '80d16601be5d34b4180407f32c3ec306' AND file:hashes.SHA1 = '7a865cc51a5a211d6c6ff49ca4fb9c69fbc94ba1' AND file:hashes.SHA256 = '519355607d92f31136d21b8ac11a2927e850de7b757af62c27e28de1ce4c1c44']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:52:59Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2e00b881-7805-493f-9af6-3dd03df10987",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:57.000Z",
"modified": "2018-03-13T13:52:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/519355607d92f31136d21b8ac11a2927e850de7b757af62c27e28de1ce4c1c44/analysis/1520376439/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7b9-d8a8-4e6e-9262-4eb302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ba-f3d8-4996-8268-446b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:19",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ba-f27c-4f43-95c6-48aa02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3f8e9ff9-7ad7-4167-acc0-a2ceffd681c1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:01.000Z",
"modified": "2018-03-13T13:53:01.000Z",
"pattern": "[file:hashes.MD5 = 'f52b55229551306c01ea94ac50d88811' AND file:hashes.SHA1 = 'f426558eb3cb96f1bc0bec0924d2cf5920022aee' AND file:hashes.SHA256 = '628460a30534d48bd4e09d9ed2e524eb30f15dda804618bef73b28f8e6a33eda']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b44e8fc7-c3df-4948-8559-55c3cfa79ffd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:52:59.000Z",
"modified": "2018-03-13T13:52:59.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/628460a30534d48bd4e09d9ed2e524eb30f15dda804618bef73b28f8e6a33eda/analysis/1520438947/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7bb-1bb8-4647-b8f5-43a902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7bc-8f5c-447a-aede-4e2802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:09:07",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7bc-23a8-4682-8977-4d0602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d2507aa9-43ee-4889-aef0-76757a8cbd64",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:04.000Z",
"modified": "2018-03-13T13:53:04.000Z",
"pattern": "[file:hashes.MD5 = '99dbcaf9091c5a43b5584ddb1a2db45c' AND file:hashes.SHA1 = '7aa59679874aa03e6ea245ee4dce240081c30289' AND file:hashes.SHA256 = '0a7c4d325455d706c3f331b595c1261e78bf59ed0c0111365604203322b1e177']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--dec03b16-27e2-4093-ab38-a00a27bc5a16",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:02.000Z",
"modified": "2018-03-13T13:53:02.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0a7c4d325455d706c3f331b595c1261e78bf59ed0c0111365604203322b1e177/analysis/1520376416/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7be-7f88-4d35-81e3-438802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7be-7bc4-4a99-a3e4-4fcc02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:46:56",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7be-3c9c-420b-9b3c-489d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0de0053d-c9e3-4ca6-90ef-f56a945de1d7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:06.000Z",
"modified": "2018-03-13T13:53:06.000Z",
"pattern": "[file:hashes.MD5 = '1f4e78e61b73d2b8a6c0aed9cadf5693' AND file:hashes.SHA1 = 'f302c09cfe131886240d03ee488033210cf28f35' AND file:hashes.SHA256 = '4e3570696f61c6fb49f9a5e4041c9552f84ad2954649f91e5e191457049e776d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--49283bd7-ffd4-4c00-acad-f7b0e61e4a15",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:04.000Z",
"modified": "2018-03-13T13:53:04.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4e3570696f61c6fb49f9a5e4041c9552f84ad2954649f91e5e191457049e776d/analysis/1520376436/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7c0-3840-4e3c-9dc7-4ea002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7c1-38c0-4f26-b601-47d402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:16",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7c1-75e4-4fb7-8d84-476d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f188e92b-8a5f-4399-b9c9-e745b9398888",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:08.000Z",
"modified": "2018-03-13T13:53:08.000Z",
"pattern": "[file:hashes.MD5 = '48866b1db2139cef3b7d323a44edf046' AND file:hashes.SHA1 = '2aaed5242da7da753b41d8285032101880cd34ab' AND file:hashes.SHA256 = 'f851b6fceaaa704f2efc94db26599c64f0b9c99dbb130ee2ad14c598c245ec11']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f3765bba-c4df-4ada-9640-73b6b56bdcd0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:06.000Z",
"modified": "2018-03-13T13:53:06.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f851b6fceaaa704f2efc94db26599c64f0b9c99dbb130ee2ad14c598c245ec11/analysis/1461595674/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7c2-498c-4a67-bd08-401c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "41/57",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7c3-f9d8-4a27-92b8-447c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2016-04-25 14:47:54",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7c3-cf6c-4f50-a896-4ce902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ee9122b3-2621-4f5d-8f22-6936733b76a2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:11.000Z",
"modified": "2018-03-13T13:53:11.000Z",
"pattern": "[file:hashes.MD5 = 'ffb4c83fa263b8a76f8b997f7a1ecffd' AND file:hashes.SHA1 = '3ea8a8ecdaad54f289203358f82a7a86dcee1649' AND file:hashes.SHA256 = '134692b2f723e62bf9cb243e69bc7d4fc613ecccd02d44072e6097ebdf34ce8e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--66faec5c-f35f-4310-ae76-b5d133c3d514",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:09.000Z",
"modified": "2018-03-13T13:53:09.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/134692b2f723e62bf9cb243e69bc7d4fc613ecccd02d44072e6097ebdf34ce8e/analysis/1520437498/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7c5-1510-42ae-ae17-413202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7c6-18f0-4b26-98c1-46dd02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:44:58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7c6-f9d0-4c4b-9515-407602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5d5cff29-0013-4f58-a217-5ffc70a9b467",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:13.000Z",
"modified": "2018-03-13T13:53:13.000Z",
"pattern": "[file:hashes.MD5 = 'd4e544d40ab16b67958c53c0a5ff3d8f' AND file:hashes.SHA1 = '4c2167f980a91a58a06832df2e9e2c9b1427cf28' AND file:hashes.SHA256 = '47d573c96a36966d4074d77855d64cdf8b977e6cae63c232cc477e622c60adec']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8ba5aae0-fca0-4615-a91c-db32cf0e838c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:12.000Z",
"modified": "2018-03-13T13:53:12.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/47d573c96a36966d4074d77855d64cdf8b977e6cae63c232cc477e622c60adec/analysis/1520910600/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7c8-ec18-44f9-9907-429c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7c8-777c-46ee-9924-4cd002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:10:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7c9-e8c0-4aca-99c2-4a2402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d5de0f3b-09de-463d-85b3-3348fc8a6331",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:16.000Z",
"modified": "2018-03-13T13:53:16.000Z",
"pattern": "[file:hashes.MD5 = '612f9e6f473c2faf993a08db5b9fe9bb' AND file:hashes.SHA1 = '70536076b4096ec46438ad3d20d001d50fa5701e' AND file:hashes.SHA256 = '1252053029722400e9f8115ad0b33235c642fbc7bbb96cf0c0d02c51d3426ae0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2c00b6d5-4b71-4749-8627-c2f99359e324",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:15.000Z",
"modified": "2018-03-13T13:53:15.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/1252053029722400e9f8115ad0b33235c642fbc7bbb96cf0c0d02c51d3426ae0/analysis/1520867460/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7cb-72d0-4e3d-9793-420b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "53/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7cc-f7d0-40af-b152-43f702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 15:11:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7cc-dae4-4674-8ac5-4b7002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9e409b3a-5452-4c05-bdb6-83a7b07e379e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:19.000Z",
"modified": "2018-03-13T13:53:19.000Z",
"pattern": "[file:hashes.MD5 = '2b69e28a11c18181c7f0532119bd9fdb' AND file:hashes.SHA1 = 'c8785540b553f6d5412516583c9d15f40047c4f4' AND file:hashes.SHA256 = '6cf02af30b8a304b565da539a6222033a6240a33aba013105a44dd77e0508faf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ceebf3aa-a6a1-42f9-b4d7-bc07e1c353fe",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:17.000Z",
"modified": "2018-03-13T13:53:17.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/6cf02af30b8a304b565da539a6222033a6240a33aba013105a44dd77e0508faf/analysis/1520376523/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7cd-4ce4-4e33-b61e-42ee02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7ce-35ec-4e62-b275-46df02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:43",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7ce-1068-4189-8c43-47a002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a0a7273f-3c33-4691-8ebe-3ce2b0d33c72",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:21.000Z",
"modified": "2018-03-13T13:53:21.000Z",
"pattern": "[file:hashes.MD5 = 'aafba3f73a1061835efc192851b52512' AND file:hashes.SHA1 = '48c8f240ec3324280eb7cf329b82c2a66022f5a4' AND file:hashes.SHA256 = '194845f61ff81aa9000b3df9f0513b737941c1eac444b5457bcb9a0f772f8b34']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:21Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b8e6eadf-5c37-4201-9195-f248b9a9ea9c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:20.000Z",
"modified": "2018-03-13T13:53:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/194845f61ff81aa9000b3df9f0513b737941c1eac444b5457bcb9a0f772f8b34/analysis/1516831571/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7d0-4d4c-488a-9c6a-460302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7d0-0570-4869-b0b2-448b02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-24 22:06:11",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7d0-8bb8-4c17-af7d-4df302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--43c21a39-d823-44b8-831b-c36317700f44",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:23.000Z",
"modified": "2018-03-13T13:53:23.000Z",
"pattern": "[file:hashes.MD5 = '4ddb841ce0b99075668e22674716c8d4' AND file:hashes.SHA1 = 'd049a2c4cbdcf5f742b012fdd24e81078878d197' AND file:hashes.SHA256 = 'e7d93e7f5cf85d8daa275fe73346930fe70233d553bd1d509cb7c2008abd3c7e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6186ed82-e296-4016-b6ca-b6fefd19587e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:22.000Z",
"modified": "2018-03-13T13:53:22.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e7d93e7f5cf85d8daa275fe73346930fe70233d553bd1d509cb7c2008abd3c7e/analysis/1520445947/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7d2-4fa0-484c-8421-425302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/58",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7d2-3544-4733-b22e-445d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 18:05:47",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7d3-999c-442c-8cec-473c02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b1fe42d9-2519-44d7-b1a6-87056aa9ec7e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:26.000Z",
"modified": "2018-03-13T13:53:26.000Z",
"pattern": "[file:hashes.MD5 = 'b25de1c21f1340ae9cf99133f80d11ec' AND file:hashes.SHA1 = '7b20a9cd0af5977488c32182bfd0116879214521' AND file:hashes.SHA256 = '949e42af2d12099f743d9c83dccaa01885ecf9f3bc40a99a9a868a7dc3e7f367']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:26Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f994c47c-ea40-412b-8854-d748ec104625",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:24.000Z",
"modified": "2018-03-13T13:53:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/949e42af2d12099f743d9c83dccaa01885ecf9f3bc40a99a9a868a7dc3e7f367/analysis/1520322156/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7d4-2af8-4798-8f54-486a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7d5-0894-4f14-a47b-4d5102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 07:42:36",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7d5-599c-46f7-8c6e-482d02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--399781fe-7ce3-48d4-836f-35080235fe53",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:28.000Z",
"modified": "2018-03-13T13:53:28.000Z",
"pattern": "[file:hashes.MD5 = '6693e904fdd23b36f443613cba5735a6' AND file:hashes.SHA1 = '574c0bf112d0d15a6579652c01ca0c1c39d93424' AND file:hashes.SHA256 = 'e9fe7ebd22877358cc0f02c233faeaf4c40cf057a3c9fe5ba0a53ff3d9765f4b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f08dfd7d-fe11-49fb-b4aa-29990ca09262",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:27.000Z",
"modified": "2018-03-13T13:53:27.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e9fe7ebd22877358cc0f02c233faeaf4c40cf057a3c9fe5ba0a53ff3d9765f4b/analysis/1520440998/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7d7-c6ac-44d8-b915-429202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7d7-2278-4f93-8525-40b502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:43:18",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7d7-5aa0-4647-9c9c-488502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a8903b85-2d3f-4c0a-a072-de47670e4c51",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:30.000Z",
"modified": "2018-03-13T13:53:30.000Z",
"pattern": "[file:hashes.MD5 = '61e42d0657d0b8bb02546f9fff9f101d' AND file:hashes.SHA1 = 'ad1ac5e7a49be2e2ade8d3d2e94dc6a0e5a1ff54' AND file:hashes.SHA256 = 'ce316a440ed198eb286f01f6c18297f8207d7ee56c5fe0f415a2bb43558e4117']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6336762e-38ab-431d-892c-11eb2ca40cae",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:29.000Z",
"modified": "2018-03-13T13:53:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ce316a440ed198eb286f01f6c18297f8207d7ee56c5fe0f415a2bb43558e4117/analysis/1514420985/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7d9-0d60-474a-86bc-4c7002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7d9-b054-461b-9cba-410202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-28 00:29:45",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7d9-cc0c-4050-8b00-4eb502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ca64f9b1-2a0a-4762-8f9e-65670a29d957",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:33.000Z",
"modified": "2018-03-13T13:53:33.000Z",
"pattern": "[file:hashes.MD5 = 'bf7ae49f1fc377ec1114aacdf704a966' AND file:hashes.SHA1 = '6925c1f7e74e549cb15527a2756eaf6b0ac9a1a2' AND file:hashes.SHA256 = '87fbf04b07fcbdd2f97f1f51d99abd19f1572f33f8253be8d79152c9b6d00aa7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c15a3bf5-7ff8-4325-af1b-f8cfc5ba01d2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:31.000Z",
"modified": "2018-03-13T13:53:31.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/87fbf04b07fcbdd2f97f1f51d99abd19f1572f33f8253be8d79152c9b6d00aa7/analysis/1520488522/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7db-ac24-4f14-ab25-493a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "56/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7db-94dc-496b-b6d0-48f102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:55:22",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7db-1d64-48b1-bc52-4e2502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--10f161a8-d5a3-4e19-8ba6-31e105782123",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:35.000Z",
"modified": "2018-03-13T13:53:35.000Z",
"pattern": "[file:hashes.MD5 = '6bfb69bc644a2ea5303a0f6f24744fec' AND file:hashes.SHA1 = '5c0cf042a0219bd28b5cfe20b30221e978aecb01' AND file:hashes.SHA256 = 'b67584f6baec97528656dfbff7749f7eb355497706359db0c4bd981c15b3e854']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:35Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--671f2cb9-b54e-4da9-bcb3-960d30dedcb1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:33.000Z",
"modified": "2018-03-13T13:53:33.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b67584f6baec97528656dfbff7749f7eb355497706359db0c4bd981c15b3e854/analysis/1520440656/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7dd-3190-41bf-bc6d-4a2502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7de-2940-4a3b-bf78-435902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:37:36",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7de-7f64-4933-8a93-419202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--07bf697d-c098-4b87-acb7-f4634bc6638c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:37.000Z",
"modified": "2018-03-13T13:53:37.000Z",
"pattern": "[file:hashes.MD5 = '5e0026a0941f4e7f0d6ad2449c4135fd' AND file:hashes.SHA1 = 'bba0f803cd72554f41e72f14f8490b628d62a579' AND file:hashes.SHA256 = '001c4d2a65dc725e1d616078834e32ef5f3f42c565165493de4997ea81451d30']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4df2a5d7-3d89-4706-8ffc-c322b2069332",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:36.000Z",
"modified": "2018-03-13T13:53:36.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/001c4d2a65dc725e1d616078834e32ef5f3f42c565165493de4997ea81451d30/analysis/1520532567/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7e0-b094-4e3a-b078-4f7602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7e0-aa5c-4e58-904a-402e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 18:09:27",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7e0-21b0-4ecc-b8f1-44a002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4f394327-9de3-4f16-bd7e-67ae011e2253",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:40.000Z",
"modified": "2018-03-13T13:53:40.000Z",
"pattern": "[file:hashes.MD5 = '9113057a19dd19b22c43fd75c41c21bd' AND file:hashes.SHA1 = 'a00f74a896838494722674dc6386a2e4c9ae1cd2' AND file:hashes.SHA256 = '3e170b6d3f4ae8a2a101dfdf1e7a0947e715992256c16087f43d268b2de7cece']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--c4e37357-07eb-44fe-a2a0-dcb9ebfef7e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:38.000Z",
"modified": "2018-03-13T13:53:38.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3e170b6d3f4ae8a2a101dfdf1e7a0947e715992256c16087f43d268b2de7cece/analysis/1520905561/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7e2-78ec-45cc-8171-408002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "55/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7e3-49c0-4359-9c46-4c1502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 01:46:01",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7e3-67e8-4bd7-86f1-4fe202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3905e8e1-d889-4208-8cc5-e6f3b7f9056e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:42.000Z",
"modified": "2018-03-13T13:53:42.000Z",
"pattern": "[file:hashes.MD5 = '10aa085b51f6fe2342e22132730c1b2a' AND file:hashes.SHA1 = '51c5088182c93e05f08ada45357915331643076e' AND file:hashes.SHA256 = '2f10286e313d0131b6a15d943ab91f0398287159f200f1c4774a095dfb979ff8']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:42Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--41093629-a5d7-493d-8c2b-f479a8fa8529",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:40.000Z",
"modified": "2018-03-13T13:53:40.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/2f10286e313d0131b6a15d943ab91f0398287159f200f1c4774a095dfb979ff8/analysis/1520376510/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7e5-aeb4-4507-9b68-4a1e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "52/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7e5-a6b4-4352-9c5a-49af02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:30",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7e5-715c-4d4c-93b9-418e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--80aa0c4d-56c4-4304-86c2-8a23da2f8ce9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:44.000Z",
"modified": "2018-03-13T13:53:44.000Z",
"pattern": "[file:hashes.MD5 = '8cc99c96034e8ceee56d25c5be6d34cb' AND file:hashes.SHA1 = '18bed7f3557e84c93c4e7837171bc655385fcdc6' AND file:hashes.SHA256 = '956c3c0a8b57b2322cc7269e08c0ecab13772093b964f6637a28f26c087f2783']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8bcd1506-8712-4d28-9a58-ca9647175c66",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:43.000Z",
"modified": "2018-03-13T13:53:43.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/956c3c0a8b57b2322cc7269e08c0ecab13772093b964f6637a28f26c087f2783/analysis/1520488301/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7e7-325c-45c1-82fa-4ab602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7e7-a8a8-4cb7-9cc9-48ee02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:51:41",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7e7-a1d4-4703-9830-475102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b5f6d323-9417-45f7-a465-2f585eda42b8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:47.000Z",
"modified": "2018-03-13T13:53:47.000Z",
"pattern": "[file:hashes.MD5 = 'a6196a94ed3914a3b070f2d7b944d65d' AND file:hashes.SHA1 = '9f6f5fadfc9a024865a3d27c40b347d1f9a0dc80' AND file:hashes.SHA256 = '32695d63215d0bd76887f1373b89607f6b73b193f37f044a518afe3db446bd65']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--45739206-d155-4d6b-af93-2f86cb8ac7dd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:45.000Z",
"modified": "2018-03-13T13:53:45.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/32695d63215d0bd76887f1373b89607f6b73b193f37f044a518afe3db446bd65/analysis/1520911260/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7e9-5870-457a-bb12-4b3f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ea-0fe4-4c37-9738-4b8702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:21:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ea-1324-4b1e-a642-468702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9d007af0-b71c-4b34-92e6-57a09987bbe2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:49.000Z",
"modified": "2018-03-13T13:53:49.000Z",
"pattern": "[file:hashes.MD5 = '22e315ad3e468a0464f012308df8f9e2' AND file:hashes.SHA1 = '47bdb19d48b6f8383d0c29bfff30049894840d5d' AND file:hashes.SHA256 = '41de9e4c043450b3d2342836ed5f56217f1dd5161394d3d52811709c3584d44d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8da16671-3dec-4c2a-931d-e88fa1bdd9ee",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:48.000Z",
"modified": "2018-03-13T13:53:48.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/41de9e4c043450b3d2342836ed5f56217f1dd5161394d3d52811709c3584d44d/analysis/1520376433/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7ec-359c-48f1-bdae-4ba102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ec-5988-4a24-8736-430802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:13",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ec-91ac-438b-815a-4e3f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--49b74b3b-9e5a-41c0-9cc6-1ceeaf82fe66",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:52.000Z",
"modified": "2018-03-13T13:53:52.000Z",
"pattern": "[file:hashes.MD5 = 'cb89c17e7d34281cb7d41eb8958727b3' AND file:hashes.SHA1 = '8dbaa869aa90a593aa7b025ca40c997867d9581d' AND file:hashes.SHA256 = '9833daa8499feb9c7fb1c6422e64904712711eb579d5196e55296cbc5a7bbbe4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--3301e1c0-2d4e-4f28-944a-6c156a8eb79c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:50.000Z",
"modified": "2018-03-13T13:53:50.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9833daa8499feb9c7fb1c6422e64904712711eb579d5196e55296cbc5a7bbbe4/analysis/1520376532/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d7ee-5194-443c-9b30-46f102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "58/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7ee-cb54-44aa-842e-43db02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:52",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d7ee-e0b0-451a-8845-4f4202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--895f0bf6-c013-48e3-8d00-7055d79eec53",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:54.000Z",
"modified": "2018-03-13T13:53:54.000Z",
"pattern": "[file:hashes.MD5 = '2ea689733fad037668d40b084eb39dca' AND file:hashes.SHA1 = 'a47e44d5391827efa8620330096f717260b85adb' AND file:hashes.SHA256 = '56b7d25e2ac670add082a1f563e5b6c18ac60c0883e1ca8dd1d069f443c43679']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6d232c0f-d48a-4b00-8bcc-5d72e80bcacd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:52.000Z",
"modified": "2018-03-13T13:53:52.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/56b7d25e2ac670add082a1f563e5b6c18ac60c0883e1ca8dd1d069f443c43679/analysis/1520438728/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7f0-370c-42f0-829c-4f8902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7f1-cbb8-4b7e-951b-4d8502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:05:28",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7f1-3d10-4ff7-be4d-45fa02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1a3ff89e-aa94-4403-9b1f-c8b939f194f1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:56.000Z",
"modified": "2018-03-13T13:53:56.000Z",
"pattern": "[file:hashes.MD5 = '0544e40ba034325d686443f0cd425e3e' AND file:hashes.SHA1 = 'b2e2749428903a90861c74cf0b2ea0cf01afd1b0' AND file:hashes.SHA256 = '374595d82e93a01325099581517b4bd8f456cb7c1c651f1a3bf2c6b084e4f588']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:56Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--22395f70-e94a-43fe-a45a-d4e21ebc289f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:54.000Z",
"modified": "2018-03-13T13:53:54.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/374595d82e93a01325099581517b4bd8f456cb7c1c651f1a3bf2c6b084e4f588/analysis/1520488263/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7f2-0d48-42a6-aa48-469702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7f3-ee04-4667-8e70-4d4002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:51:03",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7f3-de18-4367-9707-447202de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8d76e8fb-32e8-4b38-a540-8ab6539c1a13",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:58.000Z",
"modified": "2018-03-13T13:53:58.000Z",
"pattern": "[file:hashes.MD5 = '2eb34962194c741b1b5cf7319e4d31df' AND file:hashes.SHA1 = '5b2c33a879e0d74b01ce6c72e7ecff2eb822a0b9' AND file:hashes.SHA256 = 'f97576b901e8daaac28370cbbc31ed48b98cea84b64a7d83c1fc2c805bf0c672']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:53:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d6a57e30-b781-4431-96c7-a3922f77c64f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:57.000Z",
"modified": "2018-03-13T13:53:57.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f97576b901e8daaac28370cbbc31ed48b98cea84b64a7d83c1fc2c805bf0c672/analysis/1520376496/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7f5-30dc-493b-b9af-4fe302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7f5-78e0-495d-902a-49a202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:16",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7f5-a9e8-4f43-a94d-46c902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--8ddfa5e0-c492-4661-92cd-e927230d5b3d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:01.000Z",
"modified": "2018-03-13T13:54:01.000Z",
"pattern": "[file:hashes.MD5 = '9ada56f1ca6b96802333c50802916296' AND file:hashes.SHA1 = 'b9853aa66ed9b32f3b41475989abc86f2b149a14' AND file:hashes.SHA256 = '3234c6726f375d48cd7274e1e2aca5163ec20b8344637f67990f2ce1df587c62']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--ea151dbd-2122-4785-9e0b-4adee906b295",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:53:59.000Z",
"modified": "2018-03-13T13:53:59.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3234c6726f375d48cd7274e1e2aca5163ec20b8344637f67990f2ce1df587c62/analysis/1520437952/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7f7-0624-498e-bdaa-4da402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "30/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7f7-6138-4366-a2c6-41b102de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:52:32",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7f8-cccc-46dc-acaa-44ea02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--848a653a-0ff6-4b48-aa3f-ed315f673c79",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:03.000Z",
"modified": "2018-03-13T13:54:03.000Z",
"pattern": "[file:hashes.MD5 = '4401cbd1631656b82b5e88dbed510025' AND file:hashes.SHA1 = '5b6cc1644c53bebc41fa3a6c262625a9abbe0654' AND file:hashes.SHA256 = '3903705c0e2eb3b9d6c289257aa515c987ed06eab3051c7c68369a4a64d93ecf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--44e7f385-7e2c-419d-a1cc-9a62e0cb1be0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:01.000Z",
"modified": "2018-03-13T13:54:01.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3903705c0e2eb3b9d6c289257aa515c987ed06eab3051c7c68369a4a64d93ecf/analysis/1520438222/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7f9-0dc0-41e6-b004-4ef402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7fa-b880-4758-a2eb-48d302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:57:02",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7fa-2334-4b37-8ffe-466702de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--79a94358-05a4-4a42-80fa-7449e6261551",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:05.000Z",
"modified": "2018-03-13T13:54:05.000Z",
"pattern": "[file:hashes.MD5 = '8281a8b8a324aa55c22363912af080ae' AND file:hashes.SHA1 = 'bb982a9b37330741202d807504224c852314e91d' AND file:hashes.SHA256 = 'c0e4aa6f57baae774b036bb5f9e9dd70a069d5ef03164c4b5e2a5825846b365e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--692fc00c-4eb6-45d1-9772-d705f620d05f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:04.000Z",
"modified": "2018-03-13T13:54:04.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/c0e4aa6f57baae774b036bb5f9e9dd70a069d5ef03164c4b5e2a5825846b365e/analysis/1520488387/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7fc-d7e0-4648-9db3-446b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7fd-a2d4-4dce-ab6c-437802de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:53:07",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7fd-66e0-4c5c-8389-455f02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--de1f9e1e-cc20-4d3d-ba3d-ff289e81ea2e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:08.000Z",
"modified": "2018-03-13T13:54:08.000Z",
"pattern": "[file:hashes.MD5 = 'a94275946830ab4317da5d173132363d' AND file:hashes.SHA1 = 'd790c0f02c3adc3fd0926661137463066e18701d' AND file:hashes.SHA256 = '4f47e319f1ffda90d84a31c24f6eac04774cb49b0c5062614231515794df6ed7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--bd207aa7-e09f-470d-81da-8745020f58d5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:06.000Z",
"modified": "2018-03-13T13:54:06.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4f47e319f1ffda90d84a31c24f6eac04774cb49b0c5062614231515794df6ed7/analysis/1520438488/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d7ff-8274-4970-8aa8-4dae02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ff-28d4-48fc-941d-449902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:01:28",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d7ff-eb68-4e09-8b53-463302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dafda082-ec7e-46ff-a7c8-41af48f58dbd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:11.000Z",
"modified": "2018-03-13T13:54:11.000Z",
"pattern": "[file:hashes.MD5 = '27c54c09728b2a51a82b5f965af861bc' AND file:hashes.SHA1 = '1035de730d4abadb434acf2142e7a5054ffa7373' AND file:hashes.SHA256 = '705876c51b6e6c32f3be3d54349c7892e3657535a02f28748d186aa4f3a710c9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:11Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--79f3e338-4702-4264-aa1c-c03b057e5207",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:09.000Z",
"modified": "2018-03-13T13:54:09.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/705876c51b6e6c32f3be3d54349c7892e3657535a02f28748d186aa4f3a710c9/analysis/1520439107/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d801-4270-4d02-9475-488e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/57",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d802-ccec-404b-bd9c-412d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:11:47",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d802-8f18-43b2-8ba6-4ab402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--89038c85-d67e-4771-afe8-5a91d9d6edd4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:13.000Z",
"modified": "2018-03-13T13:54:13.000Z",
"pattern": "[file:hashes.MD5 = '051db7e12077819ba14e6ac0fb63102e' AND file:hashes.SHA1 = 'c5e582b4fda04883c2fead58c5876b30a83c04f8' AND file:hashes.SHA256 = 'b6cb8872c9c836932cc4d9fa84c217f8cdd2e840d5f1f34441d572aaccf6c844']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--36eac465-9951-41e9-ada5-3b203a4ad794",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:12.000Z",
"modified": "2018-03-13T13:54:12.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b6cb8872c9c836932cc4d9fa84c217f8cdd2e840d5f1f34441d572aaccf6c844/analysis/1520376469/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d804-f8c8-45dc-9b23-468c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d804-7030-428d-83e2-47c202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:49",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d804-6b3c-4293-b420-408902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dcca29bf-3545-4c53-8410-5f92da6d4820",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:16.000Z",
"modified": "2018-03-13T13:54:16.000Z",
"pattern": "[file:hashes.MD5 = '6b7ece0b260ddec3e64068c13617f95c' AND file:hashes.SHA1 = '11bb73ffb5940860c1374a0331a3db3b8ce39e6a' AND file:hashes.SHA256 = '21474c9dc0a59c8b4a9bf9a63ce2642296c3a8bd571f013f4e0744098a46f7ca']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--8a9d68e7-d771-4af0-a4a6-4fb30dbfea47",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:14.000Z",
"modified": "2018-03-13T13:54:14.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/21474c9dc0a59c8b4a9bf9a63ce2642296c3a8bd571f013f4e0744098a46f7ca/analysis/1520437684/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d806-ca98-489b-94af-4b9a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d806-37c0-4242-803e-4fc002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:48:04",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d806-87ec-4c1a-90fe-4b8402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--acb977e6-4468-4ac7-b23f-21c5f5636112",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:18.000Z",
"modified": "2018-03-13T13:54:18.000Z",
"pattern": "[file:hashes.MD5 = '2d3f197f5e7dfc7c56af4d06fbccd698' AND file:hashes.SHA1 = '9131894f6864961f886b08e94276014385a6806b' AND file:hashes.SHA256 = '9511cf49008d992c336dd4e0d944a307043f9ce47fa0323a04585145ea18c0cc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4fe83c08-1055-407a-b799-ded69ab4fccb",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:16.000Z",
"modified": "2018-03-13T13:54:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9511cf49008d992c336dd4e0d944a307043f9ce47fa0323a04585145ea18c0cc/analysis/1520440071/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d808-9870-49cf-b853-435f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d809-38c8-417a-a0a4-4ffb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:27:51",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d809-a0cc-41a6-9b34-4f0602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--bd503999-5a9e-43ea-bb23-776ad89490bf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:20.000Z",
"modified": "2018-03-13T13:54:20.000Z",
"pattern": "[file:hashes.MD5 = '3fa47f36fbf4fc08365e2078ed225c94' AND file:hashes.SHA1 = '8606b058c982c9ca6a327d61f3473b55bb9a5da4' AND file:hashes.SHA256 = 'cdcd65ada6539ae4311ac2a7edb2db6b0235edaba56266033e0690a7280504f4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a47bd8da-bdbd-4aed-9eef-a11e36096b26",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:18.000Z",
"modified": "2018-03-13T13:54:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cdcd65ada6539ae4311ac2a7edb2db6b0235edaba56266033e0690a7280504f4/analysis/1517158656/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d80a-0b2c-4bb5-ab90-4b7202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "50/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d80b-ebc4-4cec-a5fd-41b202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-28 16:57:36",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d80b-cff8-4343-9b45-4b1b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--00af6957-6e5d-4518-a3ab-78db7b785812",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:22.000Z",
"modified": "2018-03-13T13:54:22.000Z",
"pattern": "[file:hashes.MD5 = '6afe1437686d6305bc8f6b9a76655830' AND file:hashes.SHA1 = 'a199a716613af0606cc7784d1a7f85e1d717ca97' AND file:hashes.SHA256 = '88969b47fe1ad89b50f5bafa46ec769622e079ebf7a498a78f7077a87b2b90a7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e9de06fa-e36b-43b5-b5da-9da311f24fe0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:21.000Z",
"modified": "2018-03-13T13:54:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/88969b47fe1ad89b50f5bafa46ec769622e079ebf7a498a78f7077a87b2b90a7/analysis/1519135366/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d80d-3fec-49e3-9cd8-487d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d80d-e36c-4760-b03b-45e202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-20 14:02:46",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d80d-6e34-435c-8c0c-444602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5250e462-e606-43b3-af21-b25d353ca77a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:25.000Z",
"modified": "2018-03-13T13:54:25.000Z",
"pattern": "[file:hashes.MD5 = '5e3998004efc77b63ed39bd004e55d0f' AND file:hashes.SHA1 = 'f7a15143241a0b1373dd409dc94bde012e292e02' AND file:hashes.SHA256 = 'bda7983c416f16c74a954c37fd71af2b95f2c3e7cf9f4746d16cbe206974dba9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--6ae57d88-3897-4d06-aea0-539f68acd4f0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:23.000Z",
"modified": "2018-03-13T13:54:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/bda7983c416f16c74a954c37fd71af2b95f2c3e7cf9f4746d16cbe206974dba9/analysis/1520872440/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d80f-8328-4ca5-9bbe-465f02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "43/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d810-1c6c-451e-b63b-490502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 16:34:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d810-91b4-4b76-b989-4c8802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--4fa3da7c-2e32-4789-aeab-967e4c7043f2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:27.000Z",
"modified": "2018-03-13T13:54:27.000Z",
"pattern": "[file:hashes.MD5 = '67fdb9de89f5bda1dba20757e581970c' AND file:hashes.SHA1 = 'a969e7f34a346fdb2b7b66be2a7fb5cb252eadfe' AND file:hashes.SHA256 = '7a3cba962ba9a73dd99f68a0ab7c0fb77e3268005e6645827c0015d368acb0bf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--75254811-0801-4316-b27b-df50b7439502",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:25.000Z",
"modified": "2018-03-13T13:54:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7a3cba962ba9a73dd99f68a0ab7c0fb77e3268005e6645827c0015d368acb0bf/analysis/1520439347/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d811-64b0-4f9a-abf5-4ee202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d812-f43c-4657-aeeb-4c6602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:15:47",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d812-0c94-4794-80df-495802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b10a1850-a549-42eb-a281-15589b9804b9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:29.000Z",
"modified": "2018-03-13T13:54:29.000Z",
"pattern": "[file:hashes.MD5 = '959d8840c6d8f5a7e98aef36840cf001' AND file:hashes.SHA1 = 'c18c97faf4e49fe75ff46491731ca5ff1d1c416e' AND file:hashes.SHA256 = '74072ce0ba259e107a7f6549eefbe241831b257af8fca9a834b2b7e9c1649791']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--e131e510-e043-4d38-a582-391c654a491e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:28.000Z",
"modified": "2018-03-13T13:54:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/74072ce0ba259e107a7f6549eefbe241831b257af8fca9a834b2b7e9c1649791/analysis/1520439242/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d814-7f10-45b7-9224-473702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d814-b500-453c-9517-4c2a02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:14:02",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d814-39b4-455c-a352-40e802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f6a62907-ffae-4a96-b58e-a54dc45bdd71",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:32.000Z",
"modified": "2018-03-13T13:54:32.000Z",
"pattern": "[file:hashes.MD5 = 'afc23d6ebabe021ed4ce772a7d50d118' AND file:hashes.SHA1 = '45a3c50a210f4b16afea250d50f1784cd7ee046a' AND file:hashes.SHA256 = 'd00bdf9012c8e83fd4e7f6ddb9dee9167db6297151d48fd9ea660a6ae52239cc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--73293f69-441f-4861-8668-9babeecc2ab7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:30.000Z",
"modified": "2018-03-13T13:54:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d00bdf9012c8e83fd4e7f6ddb9dee9167db6297151d48fd9ea660a6ae52239cc/analysis/1520488399/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d817-324c-4d62-97ef-421402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d817-65e4-43a2-b91d-478c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:53:19",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d817-10b0-4958-adb0-48eb02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--da8a4dce-3681-4781-9bcf-b6cece8ddcee",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:34.000Z",
"modified": "2018-03-13T13:54:34.000Z",
"pattern": "[file:hashes.MD5 = 'c7b507971f39ddf559ebe76266376633' AND file:hashes.SHA1 = '9110e50e02410ea09180205e0969deb2a24909f1' AND file:hashes.SHA256 = '3f930936e2f69619c2f0894bb65b9336052d77c8149958afb391dcfdaaecdcde']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f0b4badf-9446-4115-bd57-b2a66f55f470",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:33.000Z",
"modified": "2018-03-13T13:54:33.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3f930936e2f69619c2f0894bb65b9336052d77c8149958afb391dcfdaaecdcde/analysis/1520913591/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d819-30ac-4146-b6ec-420602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d819-b664-4e76-971f-4c8202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:59:51",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d819-b4a4-4a71-9956-459002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--dc5355e8-5eab-4718-9235-f1b551b863a2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:37.000Z",
"modified": "2018-03-13T13:54:37.000Z",
"pattern": "[file:hashes.MD5 = 'c1effd346e1b86b3bf35787efdf7f81f' AND file:hashes.SHA1 = '038db79cb691beb2927d19a82bdbd2a20100cb58' AND file:hashes.SHA256 = '3978407f6443e5396459bd2971b27cfbc5297aadec810bc0dc15f365a257b58d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2d79df26-7862-4e28-acf6-b6b1a331755e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:35.000Z",
"modified": "2018-03-13T13:54:35.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/3978407f6443e5396459bd2971b27cfbc5297aadec810bc0dc15f365a257b58d/analysis/1520488271/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d81b-5c48-4f4b-bab4-4d3502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d81b-544c-4c13-bc25-4e4c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:51:11",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d81b-63fc-45f0-aa39-4bf902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d5911876-ca1d-4b22-8c38-7119fca9fa0e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:39.000Z",
"modified": "2018-03-13T13:54:39.000Z",
"pattern": "[file:hashes.MD5 = '763631361fdde3cd833b64c8fbaf0ad8' AND file:hashes.SHA1 = '176702fff1100fda59be0cd2861d1cbe960e73c0' AND file:hashes.SHA256 = 'd70c43fde7ab1dc8428a794e860c7aaa14c5a5c70747489bd3f2f16bcc8ea6d0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--487e2e6b-c536-4df1-accb-a29b42e96b2c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:37.000Z",
"modified": "2018-03-13T13:54:37.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d70c43fde7ab1dc8428a794e860c7aaa14c5a5c70747489bd3f2f16bcc8ea6d0/analysis/1520376542/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d81d-d670-4bc1-943b-404b02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "49/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d81e-c5b0-4bee-a996-439902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:49:02",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d81e-85e8-48b8-bfed-44c502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--0e4cac6a-d9b5-4118-bde4-60ad3a609a8f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:41.000Z",
"modified": "2018-03-13T13:54:41.000Z",
"pattern": "[file:hashes.MD5 = 'f7e7d35f5067f18b8b57a10d506be3d6' AND file:hashes.SHA1 = 'da351f14024a262a69b2358a3fc2b6469e14021f' AND file:hashes.SHA256 = '5f0ce2e522623fb51201212af72af0851f1a3b9c2f06cf74bb26d73eebb3fc14']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--146e4c31-21b3-46fe-b8de-7f769392972f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:39.000Z",
"modified": "2018-03-13T13:54:39.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5f0ce2e522623fb51201212af72af0851f1a3b9c2f06cf74bb26d73eebb3fc14/analysis/1517151779/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d81f-e3f0-4c73-87f5-462c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d820-0350-4117-abb7-413d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-28 15:02:59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d820-f488-405c-8f5a-4d9402de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--f0b0d5df-1bae-410a-9926-6a0e64f64ff6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:43.000Z",
"modified": "2018-03-13T13:54:43.000Z",
"pattern": "[file:hashes.MD5 = 'acdb52ba10e89aec5fe717f428636875' AND file:hashes.SHA1 = 'df4bec2c8db28c8d5a9892c9b716825bb82ce467' AND file:hashes.SHA256 = 'd156e14065b5293a5511a027e6943399b3450a6b3ff74c50e31b3b7f4a1153f1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--69b924fb-8254-413e-9800-544b82939ba8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:42.000Z",
"modified": "2018-03-13T13:54:42.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d156e14065b5293a5511a027e6943399b3450a6b3ff74c50e31b3b7f4a1153f1/analysis/1520376480/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d822-cfd8-4c22-accb-4c0902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "27/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d822-4ac4-4f9a-9b7c-4f2302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d822-8490-43d5-ad99-40af02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--26df4a37-ab0a-4532-96d1-f2e7c0109bd1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:46.000Z",
"modified": "2018-03-13T13:54:46.000Z",
"pattern": "[file:hashes.MD5 = 'c2a627770f18264c9641554fa234398d' AND file:hashes.SHA1 = '496972b5f47bc0f23f170b6a49fb3b268ffc4c11' AND file:hashes.SHA256 = '07b4420172aded36c50bc312fbb22779ee8f166a28b0ae6a2e38fdcde8e37317']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:46Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5e7ba62c-dec2-4434-9031-ecbe140bfe09",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:44.000Z",
"modified": "2018-03-13T13:54:44.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/07b4420172aded36c50bc312fbb22779ee8f166a28b0ae6a2e38fdcde8e37317/analysis/1519316589/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d824-0384-4e83-a096-45df02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d825-f320-4e7d-90c0-451602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-22 16:23:09",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d825-71a4-4ca6-92fd-478502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--077ac4ee-08ca-446e-88e3-c860f15d6e42",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:48.000Z",
"modified": "2018-03-13T13:54:48.000Z",
"pattern": "[file:hashes.MD5 = '254ab1ad65bfeeddb79e8c700671e2f4' AND file:hashes.SHA1 = 'f36abc60423b27c693c4ba3cbe36ff4cf69777d3' AND file:hashes.SHA256 = '79905733dd082deeeb5dc87b9f394c3bbb06b3097cdb53e7ce8bc3c4b460809f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:48Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--19dbb91d-5dc1-4a68-beb7-2855a8b55944",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:46.000Z",
"modified": "2018-03-13T13:54:46.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/79905733dd082deeeb5dc87b9f394c3bbb06b3097cdb53e7ce8bc3c4b460809f/analysis/1520913592/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d827-0ddc-48ae-9f03-4dfa02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d827-b51c-42be-8943-45d702de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:59:52",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d827-6044-42df-9503-4b7e02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--16be79c8-3fcf-49ad-9a56-0c21f71a340a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:50.000Z",
"modified": "2018-03-13T13:54:50.000Z",
"pattern": "[file:hashes.MD5 = 'a55555eb16d14828109fc31285a8fca3' AND file:hashes.SHA1 = '67eca0a4a2e2589007d94ee23fc0f8d16a659572' AND file:hashes.SHA256 = '8f4533d820eb7f55e55c9ddff65cb629b0bdbe97d0f14d25d5d820acd18938af']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--89a77099-d59d-44d4-8a59-0738bb796d43",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:49.000Z",
"modified": "2018-03-13T13:54:49.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/8f4533d820eb7f55e55c9ddff65cb629b0bdbe97d0f14d25d5d820acd18938af/analysis/1520376456/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d829-35a0-4b29-aac1-4c1402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/59",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d829-4c78-4886-91ab-4fff02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:47:36",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d829-4610-491b-ab70-47aa02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9652d6e1-a194-4a6a-929c-e7e956850f89",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:53.000Z",
"modified": "2018-03-13T13:54:53.000Z",
"pattern": "[file:hashes.MD5 = 'c44937768caeee00db7c39dbb803d4bc' AND file:hashes.SHA1 = '9b92e3c20e973a43b150449e7e94c4cd8e9c2784' AND file:hashes.SHA256 = 'de56fa75b0a7774bdba6e58dd1a1cc06b6b2b40d96189716612a07f4817a8d28']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:53Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--52a4df42-1337-4088-bf56-b667387402a3",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:51.000Z",
"modified": "2018-03-13T13:54:51.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/de56fa75b0a7774bdba6e58dd1a1cc06b6b2b40d96189716612a07f4817a8d28/analysis/1519857101/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d82b-c51c-4fed-a8c0-479c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "46/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d82c-72fc-4d46-9d4c-47d302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-28 22:31:41",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d82c-e170-4edb-9509-4b7102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d1d8a404-37d2-4f24-9178-8bc2dbe65ccf",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:55.000Z",
"modified": "2018-03-13T13:54:55.000Z",
"pattern": "[file:hashes.MD5 = '8b64198342354332179dc210e968f361' AND file:hashes.SHA1 = 'd9cc2829430c09ccfcea929374f0750b42ec17eb' AND file:hashes.SHA256 = 'cece67cd2b40b314c9ae10efa5468cc8c734a9d609f2b6df159fc87d56a55926']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--97568f59-097d-4e72-b4dc-fd68c408c85a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:53.000Z",
"modified": "2018-03-13T13:54:53.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cece67cd2b40b314c9ae10efa5468cc8c734a9d609f2b6df159fc87d56a55926/analysis/1520839560/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d82e-304c-43d6-b0eb-42dd02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/64",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d82e-2c28-4bee-94bd-451602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 07:26:00",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d82e-8990-40f5-aa43-4ec102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--03e306e0-62ae-4534-912a-59d311bc5ccc",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:57.000Z",
"modified": "2018-03-13T13:54:57.000Z",
"pattern": "[file:hashes.MD5 = 'ce9fd40d404d258405e38f78f08c0912' AND file:hashes.SHA1 = '0936f307d2aa64cc6236726a4b906bf6ce605c50' AND file:hashes.SHA256 = 'd158c1111de1b21a41af1099e0718ecda240a42636a5456ce2074f3ee6f7ba9a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:54:57Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--9b39352a-bfd8-4477-ac80-b9092c06bf88",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:56.000Z",
"modified": "2018-03-13T13:54:56.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d158c1111de1b21a41af1099e0718ecda240a42636a5456ce2074f3ee6f7ba9a/analysis/1520376481/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d830-4378-48a3-9c3a-4ff802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d830-5a24-4235-be2a-424202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:01",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d830-40b0-4d20-8c79-413b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3d85b1c8-be3d-4656-918a-168f4f155069",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:00.000Z",
"modified": "2018-03-13T13:55:00.000Z",
"pattern": "[file:hashes.MD5 = 'd0f90a384400bb044584c3bd808bd5d4' AND file:hashes.SHA1 = 'c977acc0d5e8aea57f92112bf2b9e4a796bebdc5' AND file:hashes.SHA256 = '7e0bea576dcde7384084a7e8754876a75ee3db4711c30d28585e157d9827b13d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:00Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--1c6103ea-83ca-4a82-aeda-c4aa8f13e23c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:54:58.000Z",
"modified": "2018-03-13T13:54:58.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7e0bea576dcde7384084a7e8754876a75ee3db4711c30d28585e157d9827b13d/analysis/1512363483/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d832-8190-43e5-a131-4e6302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d833-2c84-4d53-8985-4dac02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-04 04:58:03",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d833-6944-4dcf-bbf6-437002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--04b2a401-b201-464d-810b-88383d077361",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:02.000Z",
"modified": "2018-03-13T13:55:02.000Z",
"pattern": "[file:hashes.MD5 = 'bb42a48c6200fcfa0d98360d1aae0ce5' AND file:hashes.SHA1 = 'd6f2c47ee75c86d0728bf5a2c7e58a0d036e12a8' AND file:hashes.SHA256 = 'cefb8008b9d77d635842c5cc141fb47243ab1c2ce42145e2c2cf27ff341ae3fc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--aa6b3be5-ea62-429f-8e69-13ae6bed6d86",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:00.000Z",
"modified": "2018-03-13T13:55:00.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/cefb8008b9d77d635842c5cc141fb47243ab1c2ce42145e2c2cf27ff341ae3fc/analysis/1519872628/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d835-0c68-41eb-8c2c-42b602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d835-fee4-44fa-8447-4f9602de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-01 02:50:28",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d835-d544-4c4c-8025-404602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--882870ac-fcf6-4458-b142-3c80c26ccbe9",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:04.000Z",
"modified": "2018-03-13T13:55:04.000Z",
"pattern": "[file:hashes.MD5 = 'e7eeca7562049a6b10d7c6e0257ecdc9' AND file:hashes.SHA1 = 'b8dd823d094868f973f44e5c5a59895aba30a444' AND file:hashes.SHA256 = '70dad100507788e071b1f3f8be7c2e97a245b277510dcdcf31db82b2f826edf9']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--87ca3a43-63b2-4b36-bc14-b1d410544873",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:04.000Z",
"modified": "2018-03-13T13:55:04.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/70dad100507788e071b1f3f8be7c2e97a245b277510dcdcf31db82b2f826edf9/analysis/1520488287/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d838-f5e4-406c-8d45-485a02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d838-0cd0-40be-b899-4bc402de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-08 05:51:27",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d839-deb0-4130-b73f-444102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d054c158-41ed-4da9-a47d-6a27d632286f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:08.000Z",
"modified": "2018-03-13T13:55:08.000Z",
"pattern": "[file:hashes.MD5 = '13cc41d1578417fa57c72294d5f0b326' AND file:hashes.SHA1 = '200bbb4090ea91161da6d5c120677dca4ebb8356' AND file:hashes.SHA256 = 'e58a63d24e82bf00fc092c56e6ee75f0e3f0318dc0dbc6093897645795e3fa9b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:08Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a3318579-3b87-4794-aa53-dceb5cb0f91d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:07.000Z",
"modified": "2018-03-13T13:55:07.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/e58a63d24e82bf00fc092c56e6ee75f0e3f0318dc0dbc6093897645795e3fa9b/analysis/1513005955/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d83b-d848-4cc1-a4dd-459c02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "42/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d83b-135c-477a-890b-436d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-11 15:25:55",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d83b-f1e8-4f0f-a06f-47ce02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--56f36f82-1ba1-4809-a5e7-90cd21f3aaa0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:10.000Z",
"modified": "2018-03-13T13:55:10.000Z",
"pattern": "[file:hashes.MD5 = '29690454bbf154e2614ec977f417d40f' AND file:hashes.SHA1 = 'c0a065fefe3d94921bcbab910de8043c6ed157e9' AND file:hashes.SHA256 = '5dd05cc4deff26be3bce97a0814a1513080e1579021eea6771b2a9842050eb80']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f5228bc9-0596-44c7-a7d1-fb756784412d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:09.000Z",
"modified": "2018-03-13T13:55:09.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/5dd05cc4deff26be3bce97a0814a1513080e1579021eea6771b2a9842050eb80/analysis/1518756138/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d83d-b024-47f4-bdea-446302de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d83d-a0dc-4eef-8e57-42ed02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-02-16 04:42:18",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d83d-d2b0-4bb5-85a6-4dc902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b91e8990-cf2b-407a-8991-bbb3608c6b9e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:13.000Z",
"modified": "2018-03-13T13:55:13.000Z",
"pattern": "[file:hashes.MD5 = 'fdc33a071fff70798295b2ec22cbf735' AND file:hashes.SHA1 = '723da0bf4eb558853763d4b4ec58243709d7e0ae' AND file:hashes.SHA256 = 'd1f29d6ffb069c12670a264bf12a7ad4fc1c159b7f6aa61c97cd90d44289eec3']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f83f28b9-063a-446a-8f9c-38f9c269399b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:11.000Z",
"modified": "2018-03-13T13:55:11.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d1f29d6ffb069c12670a264bf12a7ad4fc1c159b7f6aa61c97cd90d44289eec3/analysis/1520376481/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d83f-d96c-4b2f-b5d7-420702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d83f-5af8-4b6b-92ab-42d502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-06 22:48:01",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d840-1868-4ff5-b011-474102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e4a9332e-e3d0-46c9-ba7d-ca1c7293848e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:15.000Z",
"modified": "2018-03-13T13:55:15.000Z",
"pattern": "[file:hashes.MD5 = 'ba58bf4aedb3a7af5a087e09531be350' AND file:hashes.SHA1 = 'a59220584d13e4c38180567b92d1d971f01107db' AND file:hashes.SHA256 = 'a4335d27b9ca8ab14154aff918034194a98a12eb25607e00613965bf053bcba6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--320ba851-d81c-484f-894a-701364ece4c0",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:13.000Z",
"modified": "2018-03-13T13:55:13.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a4335d27b9ca8ab14154aff918034194a98a12eb25607e00613965bf053bcba6/analysis/1512918823/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d841-0048-4632-ae8a-417002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "53/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d842-5214-47f8-a7b8-4dc002de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-10 15:13:43",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d842-83b4-44d3-a06f-493002de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b3324698-2b4a-471c-b45b-e2f397b81af6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:17.000Z",
"modified": "2018-03-13T13:55:17.000Z",
"pattern": "[file:hashes.MD5 = 'e0cc68661299ee7f8b728b502b068ded' AND file:hashes.SHA1 = 'c1c6daa77ca105f36a52de957bc6336e7e637a84' AND file:hashes.SHA256 = 'ae80eba1667456db827400aee3639bc03380ce4dec806c4c1b0485ce96b99bae']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--077cc537-080b-4c47-bf21-7df045b20744",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:16.000Z",
"modified": "2018-03-13T13:55:16.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/ae80eba1667456db827400aee3639bc03380ce4dec806c4c1b0485ce96b99bae/analysis/1512484587/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d844-f078-4403-839c-478d02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "24/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d844-6f00-45bd-983a-4fbf02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-05 14:36:27",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d845-7d24-484a-8b0e-4f1502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--9fa8595c-97de-41fd-9276-d562acbefb96",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:20.000Z",
"modified": "2018-03-13T13:55:20.000Z",
"pattern": "[file:hashes.MD5 = 'fff8783b7567821cec8838d075d247e1' AND file:hashes.SHA1 = '86330fec722747aafa5df0b008a46e3baeb30fa7' AND file:hashes.SHA256 = '258513db7949cd16330a90b2d46925768631bb54769c8d43dcfe3bf0b2617ab1']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:20Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--dd2d5a11-f02f-400b-9d17-a9e9147288ee",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:18.000Z",
"modified": "2018-03-13T13:55:18.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/258513db7949cd16330a90b2d46925768631bb54769c8d43dcfe3bf0b2617ab1/analysis/1520913596/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d846-1274-45a9-b391-4d2702de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "51/67",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d847-fdc4-4eaf-b731-45a502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:59:56",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d847-6528-4b3a-ba2f-4bd602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--446c3020-b0e4-492c-bd12-7066f1104d9d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:22.000Z",
"modified": "2018-03-13T13:55:22.000Z",
"pattern": "[file:hashes.MD5 = 'd416a1e271580d4bb683527e3ca846ec' AND file:hashes.SHA1 = '01aa4499c9bf2be0df184d0b6c48c7bf712dc925' AND file:hashes.SHA256 = 'f4f6391577fae61e6aca3040ca8fad69ea545cfc9cfeaf876f92be42e1ce8f5f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--0888e8dc-2d19-41be-b507-e64d24336064",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:21.000Z",
"modified": "2018-03-13T13:55:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f4f6391577fae61e6aca3040ca8fad69ea545cfc9cfeaf876f92be42e1ce8f5f/analysis/1513097217/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d849-6d58-401b-8565-41dc02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "54/66",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d849-a788-4722-87ec-4dfa02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-12 16:46:57",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d849-c8c0-4ee7-9a1d-47a302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ec43784b-9ba5-4e7f-8dfe-5a027d2a39c2",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:25.000Z",
"modified": "2018-03-13T13:55:25.000Z",
"pattern": "[file:hashes.MD5 = '9386dba97202778f2fbe902d98713fa2' AND file:hashes.SHA1 = 'd68a1e362f0c0fda979e939bcefb6710d03807e6' AND file:hashes.SHA256 = '29970afb6fc25dfc761fd513bb29ae79cef090d4f667a54fd5c51b9835521c93']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--66b5dbaf-aead-471a-be05-03d7ceecff15",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:23.000Z",
"modified": "2018-03-13T13:55:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/29970afb6fc25dfc761fd513bb29ae79cef090d4f667a54fd5c51b9835521c93/analysis/1520437795/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d84b-cb14-4a19-8943-461e02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d84b-a29c-4461-abee-4b0d02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 15:49:55",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d84b-bea0-4d79-9132-40b502de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--2a2a5f55-bf30-419d-8aca-626ac8cff579",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:27.000Z",
"modified": "2018-03-13T13:55:27.000Z",
"pattern": "[file:hashes.MD5 = '3a375ffa8c1ea1c84fe887c69535a096' AND file:hashes.SHA1 = '6606cabc526bf83dc67ec662ff8d73b89863451d' AND file:hashes.SHA256 = '7726a78b870ceab360e0c044b7f6a10a61283c814de09e870e49187927bd71bb']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--feeab5d5-1436-4855-9ba9-bfd9f5c956ec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:25.000Z",
"modified": "2018-03-13T13:55:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7726a78b870ceab360e0c044b7f6a10a61283c814de09e870e49187927bd71bb/analysis/1515012587/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d84d-1620-4c33-aea2-44d002de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "28/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d84e-ae38-4c3a-add3-484c02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 20:49:47",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d84e-ef54-474b-9506-4aaa02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5db9b3d7-9465-4c17-96f8-f5ed425224aa",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:29.000Z",
"modified": "2018-03-13T13:55:29.000Z",
"pattern": "[file:hashes.MD5 = '20cf15ce96e40c5f79778259b23d1eb3' AND file:hashes.SHA1 = '6ae7a39fd3d8d192118a68a01c23d0d181029e94' AND file:hashes.SHA256 = '97d6ad9fc1758ed1312135fb283acdbfe4c8af484ad84be035886d630b5b488b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f9c1b826-7799-4c2c-a723-07377a3d1bfd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:28.000Z",
"modified": "2018-03-13T13:55:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/97d6ad9fc1758ed1312135fb283acdbfe4c8af484ad84be035886d630b5b488b/analysis/1520440097/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d850-43bc-4c9f-9772-4e5602de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d850-2bf0-4490-83ae-4d3202de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:28:17",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d850-acc4-47d0-aa93-46be02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--3be79107-b34a-4c7f-ba2c-fef85b1cee8b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:32.000Z",
"modified": "2018-03-13T13:55:32.000Z",
"pattern": "[file:hashes.MD5 = '567e9750bf01828f3e1a5385768ecb15' AND file:hashes.SHA1 = '0bfff87f65f9eedd23f522f23433a4c359fdb16a' AND file:hashes.SHA256 = '9daa9be7e3d45f1a04476c969a8f73362bdd960ae3b5b5bf02ca01c958ac1db7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:32Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--166bda7d-6c12-4ddc-a33f-2d4ef0d3ec3d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:30.000Z",
"modified": "2018-03-13T13:55:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/9daa9be7e3d45f1a04476c969a8f73362bdd960ae3b5b5bf02ca01c958ac1db7/analysis/1520913242/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d852-91cc-43fd-93bc-43c402de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "36/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d853-38c8-4376-bc71-496e02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-13 03:54:02",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d853-0df0-4058-9feb-436102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6baeead3-c809-41df-b607-ca5848e68fb1",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:34.000Z",
"modified": "2018-03-13T13:55:34.000Z",
"pattern": "[file:hashes.MD5 = 'bf3628109b384926c0daf5ef34446282' AND file:hashes.SHA1 = '03cb29686389c965dd0176c318ede853e547054a' AND file:hashes.SHA256 = 'b5a71e35a190c091720e643f0dedc09c07cd481f11cfb23866f2adecff8728be']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f491f23c-43cf-4453-87db-3607b86510a4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:33.000Z",
"modified": "2018-03-13T13:55:33.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/b5a71e35a190c091720e643f0dedc09c07cd481f11cfb23866f2adecff8728be/analysis/1520856000/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d855-218c-4c0b-a3c4-4e9502de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "35/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d855-08ac-45ad-91f6-4acb02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-12 12:00:00",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d855-791c-4e55-ac4c-4ce102de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--ae8e3d01-4e47-42df-9607-9167544acc06",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:37.000Z",
"modified": "2018-03-13T13:55:37.000Z",
"pattern": "[file:hashes.MD5 = 'c9fd045485efe0eefabc6d81b4369d2c' AND file:hashes.SHA1 = '7caedadb59379ed1d502a391e37b4869425a2e58' AND file:hashes.SHA256 = 'a6a8117150a1bcb6ec16b6c002a341ab54a912190421cb404d147438bf39474a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:37Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5062fa66-2e6c-4fe1-8aa7-43cf26de6aad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:35.000Z",
"modified": "2018-03-13T13:55:35.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a6a8117150a1bcb6ec16b6c002a341ab54a912190421cb404d147438bf39474a/analysis/1520440308/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d857-02c0-4de3-9c2c-421802de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d858-f3b8-47fa-87d4-4d4302de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-07 16:31:48",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d858-92b0-4b34-89f0-4a8b02de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--7fb8d9ab-db52-4104-8f75-f38f288d8b1e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:39.000Z",
"modified": "2018-03-13T13:55:39.000Z",
"pattern": "[file:hashes.MD5 = '313aae5a7a00b2fc091b3409cc053865' AND file:hashes.SHA1 = 'ac75194fcf1b9d0759ede92de30735adf16859a8' AND file:hashes.SHA256 = '076c6d0b22fb063e85d1ca6be08b9d5b202b2a543d7a9aa9a2f525acb3c8900b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:39Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4ee3557a-7d82-4325-9be5-ce3d1ad60f98",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:37.000Z",
"modified": "2018-03-13T13:55:37.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/076c6d0b22fb063e85d1ca6be08b9d5b202b2a543d7a9aa9a2f525acb3c8900b/analysis/1520585122/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d85a-8288-4033-bf4a-42e202de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "31/60",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d85a-6838-4d71-8ac8-41e502de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-03-09 08:45:22",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d85a-2248-4c16-b408-41d302de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--6f20eba9-8ddc-4fd2-8308-09ad81eab0c7",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:41.000Z",
"modified": "2018-03-13T13:55:41.000Z",
"pattern": "[file:hashes.MD5 = 'ca45c38f09001d8e24da218ae793d65b' AND file:hashes.SHA1 = '21b703b1607970983b338307e0ecd7e115585da9' AND file:hashes.SHA256 = 'dd58286c5ce17c1c18cd7c13aa61cdc97bd483a98e79c9ab474d6ff6f1ba1269']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--be45c6a2-715c-4c95-9375-97988cb782a5",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:40.000Z",
"modified": "2018-03-13T13:55:40.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/dd58286c5ce17c1c18cd7c13aa61cdc97bd483a98e79c9ab474d6ff6f1ba1269/analysis/1514282989/",
"category": "External analysis",
"comment": "Executable File",
"uuid": "5aa7d85c-7354-4402-b744-46ae02de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "47/68",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d85c-1964-4ed6-8820-41de02de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2017-12-26 10:09:49",
"category": "Other",
"comment": "Executable File",
"uuid": "5aa7d85c-8ee0-4910-b11c-40a602de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c8442b78-eb30-4e6b-82f8-c493beab29ad",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:44.000Z",
"modified": "2018-03-13T13:55:44.000Z",
"pattern": "[file:hashes.MD5 = 'adb0b9002dc5f61e9ee811411b844af2' AND file:hashes.SHA1 = '7896cd0a62508b5e8b1b62766aea17c76f3a13c9' AND file:hashes.SHA256 = '0e8ed0237d187dc5de5406b46f248f090fa50035bdb927944853268e22c3016f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-03-13T13:55:44Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--b15ff2f5-a898-4dbf-92ef-2630c13bcb9f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-03-13T13:55:42.000Z",
"modified": "2018-03-13T13:55:42.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0e8ed0237d187dc5de5406b46f248f090fa50035bdb927944853268e22c3016f/analysis/1514998571/",
"category": "External analysis",
"comment": "Malicious Document",
"uuid": "5aa7d85e-6b50-4d53-b13a-4b9102de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "37/61",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d85e-78e0-4525-8600-4e5902de0b81"
},
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-01-03 16:56:11",
"category": "Other",
"comment": "Malicious Document",
"uuid": "5aa7d85e-fc30-48a8-ac50-412802de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a05caf80-4aa5-4db0-8bd2-1da9047aa3fd",
"created": "2018-03-13T13:55:43.000Z",
"modified": "2018-03-13T13:55:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3ebecaa7-b9a3-48a4-becf-194625b24f9d",
"target_ref": "x-misp-object--be09f3b1-9fcf-4d5b-848e-41fecd41123d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7029a64c-e25e-4529-8ce0-f9b5fc537e67",
"created": "2018-03-13T13:55:43.000Z",
"modified": "2018-03-13T13:55:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b5694caa-9b22-415f-8272-9c57b3eb08c3",
"target_ref": "x-misp-object--2b4622e3-ecfd-4e33-88d1-4be6fee2d27e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9ddc7e2b-4bcf-4235-acf2-9e07352b3335",
"created": "2018-03-13T13:55:43.000Z",
"modified": "2018-03-13T13:55:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--04a11bb7-a841-49e4-b957-a50ff66a07ef",
"target_ref": "x-misp-object--da8cc514-e9c2-43ba-8713-65bd1ee4cc93"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e267304a-d689-467b-90d3-65d2ad59af0c",
"created": "2018-03-13T13:55:43.000Z",
"modified": "2018-03-13T13:55:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--010c6b65-7d24-4eb1-b9f3-161e4bf63908",
"target_ref": "x-misp-object--3027a1fa-cc56-4b97-9c23-f87a15628a5c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--81b4a52b-fc2e-416c-9d4e-841d5a7f41a5",
"created": "2018-03-13T13:55:43.000Z",
"modified": "2018-03-13T13:55:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2ea254d8-6356-40c2-962f-e9a22e94b9a2",
"target_ref": "x-misp-object--a0e300ab-5db9-439a-a31d-078a28483155"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--74370c39-60f0-4e59-beb8-ff72cce180fe",
"created": "2018-03-13T13:55:43.000Z",
"modified": "2018-03-13T13:55:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7aa4af10-cefa-4496-aa7c-aecaa6ba6915",
"target_ref": "x-misp-object--168731b1-b9f6-49e3-8396-e43356f48865"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d99deff7-26ed-4512-b8ba-ff46f6c655f3",
"created": "2018-03-13T13:55:43.000Z",
"modified": "2018-03-13T13:55:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c3854528-0d86-43d7-9af1-c892adaa2014",
"target_ref": "x-misp-object--e3120171-4e17-469d-87cd-1c3b2214b193"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f9ace5d0-5446-4473-a60b-67f09afefea8",
"created": "2018-03-13T13:55:43.000Z",
"modified": "2018-03-13T13:55:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--32755cdb-a46a-4796-a3dc-8cdac5895b13",
"target_ref": "x-misp-object--c8f2386e-a26d-4911-8a45-e5f037add7f3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3844cc15-e0a1-4877-b168-60c6690fa89e",
"created": "2018-03-13T13:55:44.000Z",
"modified": "2018-03-13T13:55:44.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--83b23c1f-380c-4c9b-8ff1-d88a0d77e200",
"target_ref": "x-misp-object--38764b5c-c154-4392-a0c3-7574c19b999c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3a0bc8cb-7627-4569-a29f-13e733953027",
"created": "2018-03-13T13:55:44.000Z",
"modified": "2018-03-13T13:55:44.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--91f03806-38a6-41c7-bf7b-59cde7114d4c",
"target_ref": "x-misp-object--06833811-1d61-4866-b351-c35e84d53f29"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9e4caa88-7e48-45ed-a00f-a5813542ce46",
"created": "2018-03-13T13:55:44.000Z",
"modified": "2018-03-13T13:55:44.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1862b97f-3ec9-4764-af14-cb1a39e2e1e2",
"target_ref": "x-misp-object--0e9a8a1d-4d35-4624-8a79-456fb80187e4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3d460918-8480-4ff9-b996-c146edc9d7d4",
"created": "2018-03-13T13:55:44.000Z",
"modified": "2018-03-13T13:55:44.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--333502f7-2faf-4732-9cf8-0b57085db280",
"target_ref": "x-misp-object--a0cd4885-4c2a-4471-a8a5-03700ab2cf77"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4de341b7-18da-4bdb-88ec-96938c038478",
"created": "2018-03-13T13:55:44.000Z",
"modified": "2018-03-13T13:55:44.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3df64f90-91fe-4af4-b4fe-8fd371df1e2b",
"target_ref": "x-misp-object--05943cc4-e0ee-4d46-b752-673fd1f9347d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--161b0233-b941-42e8-a527-1fbd7890edd3",
"created": "2018-03-13T13:55:44.000Z",
"modified": "2018-03-13T13:55:44.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--73813f31-8277-4a96-abec-99d11d5855d7",
"target_ref": "x-misp-object--a9d050ef-1ff4-4906-a484-cf8f3f7cad84"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8aa2feeb-8eaa-4b59-a0ba-6894f4a15d78",
"created": "2018-03-13T13:55:44.000Z",
"modified": "2018-03-13T13:55:44.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7a9ebf88-5d69-41e7-a572-971cb751e615",
"target_ref": "x-misp-object--98f9a90f-6b1c-45b3-a027-9837ecbb6875"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2bc0f048-e006-45cc-8b2e-e9b3db9b10ee",
"created": "2018-03-13T13:55:44.000Z",
"modified": "2018-03-13T13:55:44.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--694ccc7c-c1e3-459c-be5e-8bbb60cf776d",
"target_ref": "x-misp-object--16b262fe-fc38-4a41-aae1-f7c79a3f2b27"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a2c4b5d9-5631-4d59-a2a1-56b8c65bb94c",
"created": "2018-03-13T13:55:44.000Z",
"modified": "2018-03-13T13:55:44.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7fbaea4b-0ef0-409d-80eb-82e5dfba5994",
"target_ref": "x-misp-object--eb32ed3c-79fb-4635-9706-c65725f4925c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--963fb0d2-fa23-489b-b96a-9764d595645e",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2bf82666-d839-4cb4-9d62-47afcbabb8d8",
"target_ref": "x-misp-object--72530e57-9793-49b0-a161-0078753a7e2a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--faec3a4b-ec89-4bfa-97bf-7edf629f77e5",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5061f21a-a424-479d-b119-eb03ca72474a",
"target_ref": "x-misp-object--9bf45a52-e2d6-4363-85cd-9f1762674618"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--041e7e66-40e4-4e6a-aff5-78fd1f7c4d9e",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d3f36e32-07db-4834-8c85-432352352e55",
"target_ref": "x-misp-object--e89df188-9ef2-4fb1-af1e-7d8990320d01"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c208d03e-3a90-4dd5-a3dc-a4ea51c958d5",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b6089b1d-ce2c-482b-acbd-4940ddf9b43d",
"target_ref": "x-misp-object--776e3fae-22a7-473d-8c9e-448f7cebe70c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--43e6cb7e-45c5-4edc-ab2c-2c31a1d8daee",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--943bbe65-be8f-4fcd-a963-8f40bee18ea7",
"target_ref": "x-misp-object--327db92f-c41f-47c6-9791-7cde1d9ce511"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8d1e8583-f4aa-4c18-964f-325c8ebe07cd",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8a6de377-1b81-4988-9132-ed8d9ecf36ff",
"target_ref": "x-misp-object--3ea6b034-235f-44ae-984c-8e5d8e2b3499"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c490dcd8-43d0-40b2-af5b-9b8c6598e336",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--39755ccf-9fff-4b16-b894-a4742fe0b548",
"target_ref": "x-misp-object--84cb6f05-0dd6-4fd0-869b-5051282359e6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--27768666-2352-49ef-9a0d-a367a312b4b1",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f2989d98-57c2-4e75-b139-d98f1debcd6e",
"target_ref": "x-misp-object--91ba1536-8bd4-4a09-a11f-590dd2f76adb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1f0c020c-522c-4868-a7d1-912ea168ac93",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4846a202-a825-4439-a27b-2e9855f3e75b",
"target_ref": "x-misp-object--fac91df2-91df-4947-8855-c63df8ea4719"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cdfefa1a-edab-44ff-8738-35c9c9367d7d",
"created": "2018-03-13T13:55:45.000Z",
"modified": "2018-03-13T13:55:45.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e01012ad-efbd-43a2-ae1e-925c8c88bdfb",
"target_ref": "x-misp-object--875c39a6-aefb-4cab-8dd1-76de2098bc65"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--19b01242-0528-4723-b84c-939a2ddd631a",
"created": "2018-03-13T13:55:46.000Z",
"modified": "2018-03-13T13:55:46.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--170a0ade-9dbd-46a0-88c8-9b9c31f603df",
"target_ref": "x-misp-object--ee355cf8-ecb9-43f6-8af7-149019418b7d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a35821ac-7f67-439d-9d4d-366f3b741b77",
"created": "2018-03-13T13:55:46.000Z",
"modified": "2018-03-13T13:55:46.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--acaf2fa6-6f3c-4b06-a5f9-3bb31b191409",
"target_ref": "x-misp-object--1eb655cb-6991-4136-9a71-5d07c824734e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7fea0e1d-6a1a-45a7-9fc2-fb305ca18720",
"created": "2018-03-13T13:55:46.000Z",
"modified": "2018-03-13T13:55:46.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--57b549c9-a6f5-4fbe-93de-835d64e5d801",
"target_ref": "x-misp-object--1c17f990-5b27-40d9-a80b-e2ff9a10c38f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--32048f15-b5b6-4c51-b331-68a519ca0072",
"created": "2018-03-13T13:55:46.000Z",
"modified": "2018-03-13T13:55:46.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--83846430-c5cf-403f-821c-665b6d7d24ae",
"target_ref": "x-misp-object--bac69422-8149-4b9b-b191-268f042035aa"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e205917a-78ee-413f-857e-502cf6d32f83",
"created": "2018-03-13T13:55:46.000Z",
"modified": "2018-03-13T13:55:46.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f7e44f2c-acce-4a13-bb4f-7a8a3f561f6a",
"target_ref": "x-misp-object--1bdd2424-ec61-48b5-b0fc-cfe234973c69"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7c06d48e-7471-4674-8385-fcfdfaf855bf",
"created": "2018-03-13T13:55:46.000Z",
"modified": "2018-03-13T13:55:46.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--860df4c8-2d41-4fc7-b3fc-abea9a79399a",
"target_ref": "x-misp-object--cd3742e9-9515-451b-9d86-0900994ffe1e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--706960ec-06b2-44bb-a0a4-b6a069b35ba0",
"created": "2018-03-13T13:55:46.000Z",
"modified": "2018-03-13T13:55:46.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f2bf99ab-22ca-42a8-ade9-dd3259513e1d",
"target_ref": "x-misp-object--f7a2f44d-913b-412f-8a87-29015a121194"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a5abc63c-c601-4f37-af21-c5d55b1260c8",
"created": "2018-03-13T13:55:46.000Z",
"modified": "2018-03-13T13:55:46.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3cdbd820-ccfe-4805-a87f-66639a605863",
"target_ref": "x-misp-object--d295ca83-4c3b-44e9-bf94-8ea103e0ca84"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--de3c272f-57f4-4e17-b17f-3f251b94c86f",
"created": "2018-03-13T13:55:46.000Z",
"modified": "2018-03-13T13:55:46.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5282a1ef-c68b-441b-b128-7b98762c7db5",
"target_ref": "x-misp-object--52b803c3-0c4c-414f-ab7f-61c009b4c3f9"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e15bf8b5-daa1-40e0-abfa-71379199c92a",
"created": "2018-03-13T13:55:46.000Z",
"modified": "2018-03-13T13:55:46.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ffee8c30-fe29-4c86-9b73-30c567bf8611",
"target_ref": "x-misp-object--6d666a98-8722-41c6-951c-010645d867ea"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1d5477b3-15b1-4497-b05e-6d551773a7a4",
"created": "2018-03-13T13:55:47.000Z",
"modified": "2018-03-13T13:55:47.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8e10aae3-e3c3-4fb9-8871-64897fb41a12",
"target_ref": "x-misp-object--51bf0041-0608-40d2-a4b8-dac196a75558"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ae069fec-9584-4b12-b096-6d0bc0542298",
"created": "2018-03-13T13:55:47.000Z",
"modified": "2018-03-13T13:55:47.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2a95ad9c-9614-4175-9c77-307846c62223",
"target_ref": "x-misp-object--1c9db02b-c9a4-4f2d-8e66-4d1116798eb4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b388a2f3-3333-45d6-9865-f2fb3d0dfeb0",
"created": "2018-03-13T13:55:47.000Z",
"modified": "2018-03-13T13:55:47.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e709461d-0ae6-468d-87eb-63960bd22851",
"target_ref": "x-misp-object--30dce96c-9cdd-40ea-8945-b106b9b4a3b2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--20570e95-96d8-49fd-a892-1568a488a9fe",
"created": "2018-03-13T13:55:47.000Z",
"modified": "2018-03-13T13:55:47.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--21ebf0fd-7772-45af-b54c-abc5df09ea6f",
"target_ref": "x-misp-object--90930896-570d-4f08-9767-9299e3e25f8c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0ad76df9-8a45-42c3-8dd3-407837175581",
"created": "2018-03-13T13:55:47.000Z",
"modified": "2018-03-13T13:55:47.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--db0cef85-c247-4270-a64b-cfc6208435b7",
"target_ref": "x-misp-object--617a92ab-8635-4f5e-80c9-a714809d0592"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4bde3ee1-8233-4fce-a7e5-01fc35b29c15",
"created": "2018-03-13T13:55:47.000Z",
"modified": "2018-03-13T13:55:47.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--73918517-e510-4af0-a019-bf2bee56493f",
"target_ref": "x-misp-object--49ea5f6c-b55f-42f9-aa76-b9d21ef849da"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9bfc83af-e2aa-49cb-8bc5-ec7e2296fa49",
"created": "2018-03-13T13:55:47.000Z",
"modified": "2018-03-13T13:55:47.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--aef2b037-4ed7-4588-8cde-a018c637147c",
"target_ref": "x-misp-object--a3c0c9b1-aa83-4af5-be53-f932ccf256bb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c751bb7f-5674-4863-b211-fabc8c8c7e5c",
"created": "2018-03-13T13:55:47.000Z",
"modified": "2018-03-13T13:55:47.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--62d5dec4-9817-4b1a-bb14-609a1b6758a5",
"target_ref": "x-misp-object--629868f3-c236-41a5-a066-de88f0bc5754"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ddc49bd3-cf2a-4c93-aad7-fe85c458d25f",
"created": "2018-03-13T13:55:47.000Z",
"modified": "2018-03-13T13:55:47.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5453664b-9768-452f-80d9-b9a02391183d",
"target_ref": "x-misp-object--588bfd9d-f8dc-46b6-8229-c99a0a18fa93"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c0135312-fdec-431b-a171-c75b032ad409",
"created": "2018-03-13T13:55:48.000Z",
"modified": "2018-03-13T13:55:48.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--76e97e10-38c3-41c9-a84d-5614621238d5",
"target_ref": "x-misp-object--281801c2-274e-4e56-9cce-7547583867fd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--33555f12-88f0-4330-9f39-d94c7ec0eb04",
"created": "2018-03-13T13:55:48.000Z",
"modified": "2018-03-13T13:55:48.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--993c1778-6454-40b9-bf98-e2c2993d751c",
"target_ref": "x-misp-object--99fd2972-6ddc-4f44-86bf-cf3cdee3d8dd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--858b49f0-c653-48b0-a3f0-710c62bc1fbd",
"created": "2018-03-13T13:55:48.000Z",
"modified": "2018-03-13T13:55:48.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--629083e5-c228-4a5f-ab26-905d65f29816",
"target_ref": "x-misp-object--30fc814c-16cf-402d-8af4-b1b42f1f0670"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--57bd14b0-33a4-4295-93bc-d153ed2a7456",
"created": "2018-03-13T13:55:48.000Z",
"modified": "2018-03-13T13:55:48.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--973eccaa-c84b-4e8a-acdc-20fb1cced3d0",
"target_ref": "x-misp-object--3bc155aa-8c8a-4ad9-a170-238d59cd6423"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--853bf5f0-2120-4168-a307-6aed7c56f298",
"created": "2018-03-13T13:55:48.000Z",
"modified": "2018-03-13T13:55:48.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9669a60a-a564-40cc-90f3-6a0619ddf84b",
"target_ref": "x-misp-object--7472369f-9901-4c09-bfb1-244c7d70e65e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8240a81a-f2dd-42a1-88a5-94aa33738033",
"created": "2018-03-13T13:55:48.000Z",
"modified": "2018-03-13T13:55:48.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f9456adf-90ba-400d-ba2a-f34cd7f929d0",
"target_ref": "x-misp-object--c51d359b-36fa-4a3f-8c24-f31adb564a9a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1c854271-fc94-4282-8e1d-edfa7743a16f",
"created": "2018-03-13T13:55:48.000Z",
"modified": "2018-03-13T13:55:48.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--eb54ed4e-6811-4c83-8aee-c334fee7214c",
"target_ref": "x-misp-object--4966f0ba-fea3-4837-b833-8f9a5d41d38e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0e590874-1f56-49dd-9c56-98fb35706e9a",
"created": "2018-03-13T13:55:48.000Z",
"modified": "2018-03-13T13:55:48.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5f4d9667-75ad-4a32-9e13-ad54428acb2b",
"target_ref": "x-misp-object--a91d690d-70d7-4949-bfb0-6067f001a596"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4a9ad7e8-0005-4fc1-b9ba-4b68af3aa923",
"created": "2018-03-13T13:55:48.000Z",
"modified": "2018-03-13T13:55:48.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9041116a-b6b5-4d5c-a565-d6178035272b",
"target_ref": "x-misp-object--848f6b87-3abc-4578-a29d-3d36b95393df"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--811991d4-598c-43cb-a9fb-2b1eca4b5b1b",
"created": "2018-03-13T13:55:48.000Z",
"modified": "2018-03-13T13:55:48.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9f28f790-484f-41c7-98fd-19c53a5784ad",
"target_ref": "x-misp-object--ccefa011-af8a-4a21-ae83-32e24a2bcf5d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7e59106b-69dc-440e-a141-fd870ed7946b",
"created": "2018-03-13T13:55:49.000Z",
"modified": "2018-03-13T13:55:49.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--20a1faef-5b03-4328-a877-a6d9ecce874d",
"target_ref": "x-misp-object--d3df38dc-94a4-490a-a393-30f28bb71c2a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f0ff4c61-f190-4f52-89d2-1ab7820954da",
"created": "2018-03-13T13:55:49.000Z",
"modified": "2018-03-13T13:55:49.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--62f011a5-158a-4e17-9274-373a8afa7f89",
"target_ref": "x-misp-object--fd076d81-b315-4442-825d-b43dd7931e58"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fcbf171e-ce29-46d2-96d7-5e1591293bf9",
"created": "2018-03-13T13:55:49.000Z",
"modified": "2018-03-13T13:55:49.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2910e51e-9648-4e47-afdf-a4e987e19b36",
"target_ref": "x-misp-object--de7ed8dc-8696-458b-bb57-f9f9108072ec"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--36c3700e-e27d-4e0c-b1ae-165d3242d5fd",
"created": "2018-03-13T13:55:49.000Z",
"modified": "2018-03-13T13:55:49.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d1784ba3-1ef0-4d79-8079-c9dc92251090",
"target_ref": "x-misp-object--122ea312-54ee-42c9-9246-5a1b4c5d6e9d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--aab253dc-7713-44ca-bef7-412e05a07183",
"created": "2018-03-13T13:55:49.000Z",
"modified": "2018-03-13T13:55:49.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f30501a4-1ca7-4609-957b-15efbfab4c35",
"target_ref": "x-misp-object--d9686b2d-97a4-4279-908e-a465007070a0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--69e3abfb-4ef1-4b5f-9e52-045850c9cd73",
"created": "2018-03-13T13:55:49.000Z",
"modified": "2018-03-13T13:55:49.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6f94cdef-c5a9-409d-9fa3-8a13133ff47f",
"target_ref": "x-misp-object--4012a76c-de18-4390-a286-2c83696b393d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d93a236b-f214-4067-b101-524c0997a5bb",
"created": "2018-03-13T13:55:49.000Z",
"modified": "2018-03-13T13:55:49.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4b6c97d5-3fe1-4419-bf6b-f179e663bcd1",
"target_ref": "x-misp-object--9fa6c908-2ff0-4298-aa58-9fed29b6621c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a52828b8-0980-4fca-9e4e-f2fb470cf981",
"created": "2018-03-13T13:55:49.000Z",
"modified": "2018-03-13T13:55:49.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5f5a9bef-cbc2-4048-a584-02fe6b323301",
"target_ref": "x-misp-object--d4ce528e-6e53-4462-8b4d-bf43bcf7a122"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3565f8db-5d7a-49e2-a772-e55b6d35cef8",
"created": "2018-03-13T13:55:49.000Z",
"modified": "2018-03-13T13:55:49.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3c44b011-cea0-49e8-b582-fad55d1d8af1",
"target_ref": "x-misp-object--d9f6f916-1093-437b-9010-23a6d7ba2770"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4ab870f6-cccd-4671-a6ca-7e2e041585ac",
"created": "2018-03-13T13:55:50.000Z",
"modified": "2018-03-13T13:55:50.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--262143f5-8e2c-48f0-a7ff-98463168dc27",
"target_ref": "x-misp-object--b1bd6e18-7266-4a67-b549-1177d939703d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--30d95c4d-3b67-40e3-bdee-61d652a21a89",
"created": "2018-03-13T13:55:50.000Z",
"modified": "2018-03-13T13:55:50.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4778b0bb-ca98-4bd7-8f8a-5d408f3cff9e",
"target_ref": "x-misp-object--4006abea-7694-4809-ad2f-f5b1d0b8648a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6cab2053-e839-4341-9150-0746d0a4949b",
"created": "2018-03-13T13:55:50.000Z",
"modified": "2018-03-13T13:55:50.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c8f23cd0-337b-4520-b4d3-c7b053601507",
"target_ref": "x-misp-object--17da1ccf-d4c1-4428-8404-8d3659d59793"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--137d8a0f-d5a7-44cd-9ee5-f5a31c112e79",
"created": "2018-03-13T13:55:50.000Z",
"modified": "2018-03-13T13:55:50.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b01eed1e-c2f3-4a55-ae9e-c38e8d385f0a",
"target_ref": "x-misp-object--b544c25d-094a-4b2b-a6dd-14b6ace52836"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c94a6c67-4f3e-4c26-be63-cd55fdcbd18f",
"created": "2018-03-13T13:55:50.000Z",
"modified": "2018-03-13T13:55:50.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7fe8a7d6-0855-42f6-9a14-b2824acfb3b4",
"target_ref": "x-misp-object--42755064-ba05-4f91-b78f-689be27b717e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f8ed39f5-475c-4c37-af49-dc7aed9535b6",
"created": "2018-03-13T13:55:51.000Z",
"modified": "2018-03-13T13:55:51.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7515eaf4-b764-46a3-b4bb-a9dd4669c17e",
"target_ref": "x-misp-object--fc459030-58b1-4629-8287-71eb17a46f1f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2d30e64f-c786-4761-aca4-0705306f2db2",
"created": "2018-03-13T13:55:51.000Z",
"modified": "2018-03-13T13:55:51.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0c710fd7-5c24-4156-80af-9ce1133f1b34",
"target_ref": "x-misp-object--59ee90d1-bae4-42a5-9686-5f2ad4cb8007"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--93c4928b-5f9d-412c-823b-a5fffb014a89",
"created": "2018-03-13T13:55:51.000Z",
"modified": "2018-03-13T13:55:51.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1f4e9c0c-d4b9-4b41-b50e-95a86e12635f",
"target_ref": "x-misp-object--c60414fe-d8a1-485f-b326-ec39137346c4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7096e01f-f15b-4bbc-91a2-7b95ebf5b39a",
"created": "2018-03-13T13:55:51.000Z",
"modified": "2018-03-13T13:55:51.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--772a44aa-5648-43da-ae46-a43b0e51dede",
"target_ref": "x-misp-object--8076f407-c7c6-42e5-9901-5ea7dca9e02c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9c72d019-89d6-400c-abe5-9b7da0db8b1b",
"created": "2018-03-13T13:55:51.000Z",
"modified": "2018-03-13T13:55:51.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3842366a-678d-443f-83ba-e2523a409506",
"target_ref": "x-misp-object--0c7561b8-109e-4cde-85ee-0c5ceaa66987"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b5e15962-5b4b-41a2-918e-5ce998a7e12a",
"created": "2018-03-13T13:55:51.000Z",
"modified": "2018-03-13T13:55:51.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6e33ec1b-4c4b-4ff2-9df3-e0ef2cf0d557",
"target_ref": "x-misp-object--68bfceef-61e7-40b2-8baf-9191f74d200c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--408e38cd-8a0b-464d-9600-5750497f80c8",
"created": "2018-03-13T13:55:51.000Z",
"modified": "2018-03-13T13:55:51.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b41008c1-0bec-4725-b8fa-fb41541dedc0",
"target_ref": "x-misp-object--e7aedbef-df58-4fa7-b32a-34eb2c0ed4e5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2ebd0cbe-1ea2-4b77-b8a9-c2cdc22af3bf",
"created": "2018-03-13T13:55:52.000Z",
"modified": "2018-03-13T13:55:52.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a0ff86b1-25e6-4093-8971-dccc063f05a8",
"target_ref": "x-misp-object--724bc7ba-ba88-4e5d-9c40-7676621f8735"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e781b0bc-4e69-4cfc-af2e-140c8a2e49ab",
"created": "2018-03-13T13:55:52.000Z",
"modified": "2018-03-13T13:55:52.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1373fe1f-de01-4475-915b-6851db2f39e4",
"target_ref": "x-misp-object--fc7f1e60-0b74-422a-809b-d51ccf402c0e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--51828391-72c6-4a6c-b5a9-b8cf845e8ce1",
"created": "2018-03-13T13:55:52.000Z",
"modified": "2018-03-13T13:55:52.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c45f14db-dfbd-4555-b390-2276e6ff1ad2",
"target_ref": "x-misp-object--fae7c364-8729-429b-9ea9-3b31af0f3ea5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ebb8041b-0f3d-48c9-9d01-e779fe832a68",
"created": "2018-03-13T13:55:52.000Z",
"modified": "2018-03-13T13:55:52.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--56a2d91c-c23b-4c5e-b2e3-921244e87225",
"target_ref": "x-misp-object--1e6b86c2-a47c-487a-9f37-325383622e1d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--de4a2eee-75de-4495-ab45-7118fef51cbb",
"created": "2018-03-13T13:55:52.000Z",
"modified": "2018-03-13T13:55:52.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6d17c059-317b-40e2-9085-4f8286e2d10e",
"target_ref": "x-misp-object--00d27731-8a04-43ba-944f-d93082b05bce"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--327b0fbe-e9fd-49b2-9166-034ac5e7dd01",
"created": "2018-03-13T13:55:52.000Z",
"modified": "2018-03-13T13:55:52.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a5a9364c-78a9-48e7-9960-74cafd72c762",
"target_ref": "x-misp-object--8812bcfd-652a-48f9-8ce0-d0859f8a7d74"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5b194468-8398-4d93-a108-a37f7d430c7e",
"created": "2018-03-13T13:55:52.000Z",
"modified": "2018-03-13T13:55:52.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--cfdebb5e-9bed-4110-91e1-967541c218d5",
"target_ref": "x-misp-object--088a12ae-cb7c-4e19-bf34-de6c31c42421"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--179ee5dc-15b8-40cd-92be-41bae531cef2",
"created": "2018-03-13T13:55:52.000Z",
"modified": "2018-03-13T13:55:52.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8cfdb710-e0eb-4aa0-be7f-4bef7c057f48",
"target_ref": "x-misp-object--50d32b71-58f6-49bd-950c-8201f8c8f6a0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--18d2e4b8-d4b7-49e9-91af-034e6bb75ed5",
"created": "2018-03-13T13:55:52.000Z",
"modified": "2018-03-13T13:55:52.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0ee0151f-da7d-4d9f-8d67-74dc297b1ac7",
"target_ref": "x-misp-object--afef20ad-8f41-41fd-ab24-c13d4bb81db2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--66d68f38-552b-4adc-bcad-7954b7925007",
"created": "2018-03-13T13:55:53.000Z",
"modified": "2018-03-13T13:55:53.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--66c51f09-728f-4bbc-a2f0-8fd2dd9ee34c",
"target_ref": "x-misp-object--94c29569-4c2f-4eca-83ea-71b34b2f04ac"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fc9346a4-eb89-4a4a-a3e6-8183b9f5d026",
"created": "2018-03-13T13:55:53.000Z",
"modified": "2018-03-13T13:55:53.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8ba4601c-07fc-4c31-b409-70f55daec9da",
"target_ref": "x-misp-object--e0e6c464-9727-4e62-99a8-d2d896ef3be0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ec26eddd-5a65-47d0-93bd-8fe51f23e395",
"created": "2018-03-13T13:55:53.000Z",
"modified": "2018-03-13T13:55:53.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c7f95bca-d452-4ca5-b2fd-81284eefa29a",
"target_ref": "x-misp-object--95bd6a8c-2c13-44dc-a176-04b903e55468"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a7b14923-f566-411d-b8a8-493d24290509",
"created": "2018-03-13T13:55:53.000Z",
"modified": "2018-03-13T13:55:53.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--895e6d73-cc04-4d7d-a74f-1c79d68cc85d",
"target_ref": "x-misp-object--ba96f218-b01d-4fb3-986e-4a4b129d501a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b215e5ae-ac55-4835-a83f-a1cb80d4842c",
"created": "2018-03-13T13:55:53.000Z",
"modified": "2018-03-13T13:55:53.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a18a3d72-f1c0-40f0-9281-25c93d8002c7",
"target_ref": "x-misp-object--d673e058-bd6f-4588-b64a-5f26648b833f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0f6951d2-348a-481c-9932-ab21c65dcf56",
"created": "2018-03-13T13:55:53.000Z",
"modified": "2018-03-13T13:55:53.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1a981d65-59bc-4a14-81a1-008f4c77159a",
"target_ref": "x-misp-object--ad7412ca-ba99-4dc1-9098-1b14d7898562"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b15d8813-fafd-4697-be92-661397662b22",
"created": "2018-03-13T13:55:53.000Z",
"modified": "2018-03-13T13:55:53.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f6601087-35c3-4239-85b2-25f4a4c9c1f0",
"target_ref": "x-misp-object--f1915336-fa1d-4500-931f-5368fbc727d4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ce78b445-4458-49d3-8bbe-e200c995da9e",
"created": "2018-03-13T13:55:53.000Z",
"modified": "2018-03-13T13:55:53.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--abf60cec-d36a-4744-b7a1-a33e5763a9c4",
"target_ref": "x-misp-object--32ea0688-10d4-4123-b4c6-d68fb5cc55d4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--536f6e4d-3b36-4582-944c-1f5f1f05cc32",
"created": "2018-03-13T13:55:53.000Z",
"modified": "2018-03-13T13:55:53.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a8aecb74-f7d5-4f56-9dc7-3c00ba2f4b0d",
"target_ref": "x-misp-object--f355561d-a7fa-4896-be8c-1f8274815354"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7b5d5f37-d200-4f19-a8fc-81061b57b4dd",
"created": "2018-03-13T13:55:53.000Z",
"modified": "2018-03-13T13:55:53.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a9d8f073-dd7a-4e9b-a0a7-04598ce32926",
"target_ref": "x-misp-object--10380065-18d9-4ca8-8cb4-dad38fdd929d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--390e3098-5986-4b68-b158-3f9676aaf0b1",
"created": "2018-03-13T13:55:54.000Z",
"modified": "2018-03-13T13:55:54.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7638c728-3089-4a20-af0a-b37900bc1f1d",
"target_ref": "x-misp-object--86f66db8-becb-45ae-b0f3-e3340cd5d19a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--17cd631d-f247-4fd6-852a-0cf7bf19377f",
"created": "2018-03-13T13:55:54.000Z",
"modified": "2018-03-13T13:55:54.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7f886d78-e6f7-4ecd-8828-e9693e314aa0",
"target_ref": "x-misp-object--0f3c8eab-f129-49da-9ed7-cc8b7f1b09f0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--585ad4ef-0354-4bae-9e8c-87b612430ea0",
"created": "2018-03-13T13:55:54.000Z",
"modified": "2018-03-13T13:55:54.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--51f66ea4-bd23-495b-be2c-64962e187550",
"target_ref": "x-misp-object--ff35fc80-aed9-44b8-bf9a-04ae04bb9b29"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9e4df10b-71f9-46a3-9d80-cd0ccc481af3",
"created": "2018-03-13T13:55:54.000Z",
"modified": "2018-03-13T13:55:54.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--93cdfd6c-153f-458f-8b4d-6d3eea4d85fa",
"target_ref": "x-misp-object--25d08574-096e-4a9b-b9cc-e292aff3160a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7d946568-091f-46b2-bcfd-37ef0f12c40f",
"created": "2018-03-13T13:55:54.000Z",
"modified": "2018-03-13T13:55:54.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d2244ec7-b833-45ee-b46d-46d0eb8821a6",
"target_ref": "x-misp-object--0dd974d2-228a-4efd-9c80-5c3ebec6afe2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f4352ae9-1ab0-4692-861c-c58bd3ff3224",
"created": "2018-03-13T13:55:54.000Z",
"modified": "2018-03-13T13:55:54.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a252e7e6-4210-4a0e-af70-808685490bf0",
"target_ref": "x-misp-object--3fda77bd-6a6a-4fdb-a784-0569bd5b8bc4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e3b14b54-2ccb-441f-b449-4bbc4a16c9a0",
"created": "2018-03-13T13:55:54.000Z",
"modified": "2018-03-13T13:55:54.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--652791f2-58a3-4bc2-9127-eee90e5777fc",
"target_ref": "x-misp-object--245b7bed-15e3-4235-86bd-27e0d9bc6c46"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--41fce62c-d7b6-457b-987c-124cfc421f43",
"created": "2018-03-13T13:55:54.000Z",
"modified": "2018-03-13T13:55:54.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bd4872e3-93f3-4a82-85ab-0fef4dc1a473",
"target_ref": "x-misp-object--47225078-5904-4fc7-96ae-03e630f628e7"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--825d1383-9255-4184-b685-85713f3d7fa4",
"created": "2018-03-13T13:55:54.000Z",
"modified": "2018-03-13T13:55:54.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7724b584-9fbf-4690-8824-571ca40e8647",
"target_ref": "x-misp-object--a9700a79-b809-4626-9a0f-1b5e30547578"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--038188d7-ce6b-4ec9-8f97-e07450d148c2",
"created": "2018-03-13T13:55:54.000Z",
"modified": "2018-03-13T13:55:54.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--eccc55d5-a165-4f16-8dba-993df6d0c16d",
"target_ref": "x-misp-object--c14e1628-941c-43c0-81ef-0b8bf8e8db3e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7714f3cf-f6a1-4dcb-88c5-3dd65bd9470c",
"created": "2018-03-13T13:55:55.000Z",
"modified": "2018-03-13T13:55:55.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--da83d80a-c5b2-4f00-b78f-bd6cea6c47be",
"target_ref": "x-misp-object--e7be8927-c465-4b2e-bfcc-68a41eae297a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7c2fab3c-df62-4ef9-9211-e7ddd6cf3a5a",
"created": "2018-03-13T13:55:55.000Z",
"modified": "2018-03-13T13:55:55.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--de30c258-e3ff-4103-90f0-66b263006c0b",
"target_ref": "x-misp-object--c9f224ab-0c81-4deb-9160-85f96bc624c2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--eaa2bed2-af14-4aae-b6d3-1ef9bf1b251a",
"created": "2018-03-13T13:55:55.000Z",
"modified": "2018-03-13T13:55:55.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e4f6dfdc-fb92-4812-8c6d-91b7548ebadf",
"target_ref": "x-misp-object--f83784d1-6a08-4009-a46e-4aed15ff5dee"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f563d60e-f515-448b-b7ba-10de7b825a72",
"created": "2018-03-13T13:55:55.000Z",
"modified": "2018-03-13T13:55:55.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5a0cdfe2-1650-41fa-ac1f-99afa14cc188",
"target_ref": "x-misp-object--b3785c90-1c5f-4739-8cf1-31e946583359"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3490dd1e-42d8-47c1-bffd-fa4bf7d66b45",
"created": "2018-03-13T13:55:55.000Z",
"modified": "2018-03-13T13:55:55.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--da10673d-4b03-473f-943b-e68b51a49372",
"target_ref": "x-misp-object--c0f2a053-934c-4be9-ad1d-7249dfef9301"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--415ee05c-5318-450b-a5ed-11a49e02aecb",
"created": "2018-03-13T13:55:55.000Z",
"modified": "2018-03-13T13:55:55.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--cb0ffcf7-6e1a-4bc5-b72e-b1c50a4c072a",
"target_ref": "x-misp-object--c0d442d4-72b6-47cb-b4b8-18744a4fd84d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b99e3126-e8df-46c3-807f-7879d7e250e5",
"created": "2018-03-13T13:55:55.000Z",
"modified": "2018-03-13T13:55:55.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4272cdd1-73f2-4b9a-a8b5-64d3a1d7dfd0",
"target_ref": "x-misp-object--857ca1d6-7992-4e86-9a8a-9baf9005bbd9"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9a5a40f1-fa6f-4fec-9183-bb21f9df6025",
"created": "2018-03-13T13:55:55.000Z",
"modified": "2018-03-13T13:55:55.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2f2d7190-59a8-4a22-b2af-ac312b91bfe0",
"target_ref": "x-misp-object--df56eb90-6fe6-4dc2-86c7-0c1134d65812"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4f967213-4398-4381-9431-160222d5082a",
"created": "2018-03-13T13:55:55.000Z",
"modified": "2018-03-13T13:55:55.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2701b8c8-6625-4f06-a88f-c78f56165a61",
"target_ref": "x-misp-object--9f4f8732-0f86-487d-b2f5-1d2d89aef0bd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b84fe0dc-b479-4d6e-af32-085f26c0da77",
"created": "2018-03-13T13:55:55.000Z",
"modified": "2018-03-13T13:55:55.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--93b95f15-4cb7-419f-841c-450ac3d2fcf6",
"target_ref": "x-misp-object--048e1c5f-6a94-4dd9-bbf7-eda1802b6d9c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9396cf13-e910-4652-bef5-deca00494890",
"created": "2018-03-13T13:55:56.000Z",
"modified": "2018-03-13T13:55:56.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--be1441ae-b2e5-41ed-abdd-414809f6352f",
"target_ref": "x-misp-object--3741aec9-519d-4649-ad8a-549d2450e256"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e492595b-cc5e-41cd-b457-3dfc16f726c2",
"created": "2018-03-13T13:55:56.000Z",
"modified": "2018-03-13T13:55:56.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f231a6ea-f8b4-43f8-adac-96e31854da2c",
"target_ref": "x-misp-object--e5f7cc1c-cd7e-49f5-9d23-96945164180e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d2efd808-f420-4350-84f4-5c25c2b76f1c",
"created": "2018-03-13T13:55:56.000Z",
"modified": "2018-03-13T13:55:56.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f9a65653-53de-44fd-a416-29aeb4cf5f1e",
"target_ref": "x-misp-object--19789499-f9e3-4415-afb9-7dee60e37880"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0630b6a5-6843-46bf-9deb-4f1bc8c4a13a",
"created": "2018-03-13T13:55:56.000Z",
"modified": "2018-03-13T13:55:56.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--091a7f76-14d6-48df-86fc-76bf406a81a9",
"target_ref": "x-misp-object--fc99724e-fb1c-49c1-a876-021d95449e91"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c910bc97-50f0-46ba-a8ab-25779ae33176",
"created": "2018-03-13T13:55:56.000Z",
"modified": "2018-03-13T13:55:56.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--edc558da-e5d9-484e-a89c-2d4286e33de7",
"target_ref": "x-misp-object--a567af95-f7a3-4bf2-baa3-270f681e5322"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--445f7629-4dbd-4eaa-8764-d6371958f359",
"created": "2018-03-13T13:55:56.000Z",
"modified": "2018-03-13T13:55:56.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ad876176-ecb0-4443-a1e3-3474fea95c7c",
"target_ref": "x-misp-object--4c0aa304-4439-4634-ab20-fa7a819e4cfb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ec267ca5-d064-43a8-9706-f2995523ca1f",
"created": "2018-03-13T13:55:56.000Z",
"modified": "2018-03-13T13:55:56.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--27853edd-8b95-4a9c-8fd5-256adb3e5da6",
"target_ref": "x-misp-object--4a39f8b7-6642-4a32-aa2c-511de3de0ae6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cf4cd696-7aee-477e-b7ce-e7ec9ef32a84",
"created": "2018-03-13T13:55:56.000Z",
"modified": "2018-03-13T13:55:56.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--63998fb4-3796-4b69-bbb5-c786f85c6e24",
"target_ref": "x-misp-object--77335a35-58f3-4736-8e65-9d43eadd3255"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4ebdb2cb-ad08-4b75-a7cf-51845238d019",
"created": "2018-03-13T13:55:57.000Z",
"modified": "2018-03-13T13:55:57.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f501ee7d-5468-4059-a745-dc1f392e6a44",
"target_ref": "x-misp-object--8482a386-b5b8-479a-974a-219fe749b1ab"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c55c8836-a5a8-422d-8fc0-c4ff2feb6302",
"created": "2018-03-13T13:55:57.000Z",
"modified": "2018-03-13T13:55:57.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ebfa55c6-2e68-4f35-a2f3-060799e22095",
"target_ref": "x-misp-object--a3bb6a50-5123-498e-8f1a-6923b54b0b35"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b669728b-6268-4ea0-90e6-2618338442ba",
"created": "2018-03-13T13:55:57.000Z",
"modified": "2018-03-13T13:55:57.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2316025b-81d4-4611-8420-62597b2163f7",
"target_ref": "x-misp-object--436f3cd9-f66e-4d35-b0c3-ba8c39c5a0c4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e7cc7aa2-fbaa-43f4-95b8-789b2ba76cab",
"created": "2018-03-13T13:55:57.000Z",
"modified": "2018-03-13T13:55:57.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--dc57f819-a4ca-4824-ba9d-e6d0e9f78b9d",
"target_ref": "x-misp-object--37f56d93-b168-44cb-90c9-e245c6eee85a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--62b2abcd-399c-47ba-967e-12316583c564",
"created": "2018-03-13T13:55:57.000Z",
"modified": "2018-03-13T13:55:57.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4f1fd255-9d15-43ec-a8b6-5fdf0abbd1c5",
"target_ref": "x-misp-object--18efd0c2-3813-4e9f-bf69-330dea779353"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--02c764de-9fec-469f-a354-07837668ef48",
"created": "2018-03-13T13:55:57.000Z",
"modified": "2018-03-13T13:55:57.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8f789d00-5c20-45f6-8091-834ea7f79fcd",
"target_ref": "x-misp-object--74d6bbc6-5b6e-485e-b40f-e0076046c307"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--792c7d75-43b1-4531-9b30-d984a046d52f",
"created": "2018-03-13T13:55:57.000Z",
"modified": "2018-03-13T13:55:57.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--318e9442-266a-42df-9bcb-57af40dc6fee",
"target_ref": "x-misp-object--9f4cb389-a3be-4918-8887-595689e68ba0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0397bf1c-5d0d-409a-a75d-2c0662bd933a",
"created": "2018-03-13T13:55:57.000Z",
"modified": "2018-03-13T13:55:57.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6212c88a-a171-457e-bce5-e495cb75bcd6",
"target_ref": "x-misp-object--8d1e8e66-f43c-4d3f-8b88-326769b2dadd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fb8bc43b-ae54-43b1-a5c8-485edad82737",
"created": "2018-03-13T13:55:57.000Z",
"modified": "2018-03-13T13:55:57.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b564d217-c2db-44d8-b069-916f0fee7fc7",
"target_ref": "x-misp-object--2693cbb3-ac2c-476e-a4bf-b199c7e88878"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a70a1cda-c00d-4609-8e4f-d702444f69ab",
"created": "2018-03-13T13:55:57.000Z",
"modified": "2018-03-13T13:55:57.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3bc0a925-001a-4ec0-b662-c6ffdfa883da",
"target_ref": "x-misp-object--9c4a8abf-36e5-45f2-9950-acb6fc6d6d8d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cd63a917-3c8d-4719-9cc2-00860601063a",
"created": "2018-03-13T13:55:58.000Z",
"modified": "2018-03-13T13:55:58.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--de573c2e-d1b7-4454-830b-ee0de6ffebe7",
"target_ref": "x-misp-object--2b361753-16d6-4b91-aa83-2241be1c2111"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3ad72079-18f7-4461-9749-3a5b12910f9a",
"created": "2018-03-13T13:55:58.000Z",
"modified": "2018-03-13T13:55:58.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f845f0d3-8a14-4cd0-ac52-b68a45ad6bd1",
"target_ref": "x-misp-object--22ac03b3-05b2-4cb3-b1cf-06a04d09b191"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--54bcc54c-cc34-4aeb-8332-db75a384be8f",
"created": "2018-03-13T13:55:58.000Z",
"modified": "2018-03-13T13:55:58.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b7dc6423-6d05-411f-ab96-1f5fe5bff960",
"target_ref": "x-misp-object--99910c76-477b-4cf0-bae3-dd9aabed6f4c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--275f31b6-e4f0-49c8-8382-6ff74a0df553",
"created": "2018-03-13T13:55:58.000Z",
"modified": "2018-03-13T13:55:58.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--db1db06e-a0ec-4bb8-b529-d8eb867e24c4",
"target_ref": "x-misp-object--5fc6ede9-b781-4eb4-8c6a-a47a025901ef"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0d9c1035-7cda-450a-a589-c73a98ffb04a",
"created": "2018-03-13T13:55:58.000Z",
"modified": "2018-03-13T13:55:58.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--42066cdc-d515-4c5e-b536-6403bd2fa1b5",
"target_ref": "x-misp-object--869f01f6-7bb3-44b4-bc9e-8b736da289fa"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d37e8fa8-0567-4124-a440-5e754bd0bdf4",
"created": "2018-03-13T13:55:58.000Z",
"modified": "2018-03-13T13:55:58.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b2a4407f-5430-4c80-bf8f-507f234cdf38",
"target_ref": "x-misp-object--081ea566-bd34-49d7-be26-ccbb3ad585d1"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--df9f03ba-b817-47d5-bdd0-38fd9c5016a0",
"created": "2018-03-13T13:55:58.000Z",
"modified": "2018-03-13T13:55:58.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4baac2f7-b640-49ea-aa37-60ae3a4b7e66",
"target_ref": "x-misp-object--93f77b86-ed4f-4313-8c22-6010b7795a8d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1eb11766-05d0-4512-8ca7-58da8ff664ae",
"created": "2018-03-13T13:55:58.000Z",
"modified": "2018-03-13T13:55:58.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7baf9480-e568-41e6-a1f1-fff7d516fbb1",
"target_ref": "x-misp-object--b8d85b22-76dc-4882-85ac-0fb0f74b754f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--80edbbbb-9f1b-48af-b9f5-43bed5670207",
"created": "2018-03-13T13:55:58.000Z",
"modified": "2018-03-13T13:55:58.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--70733fd0-6c28-4129-980c-8ff97d139d43",
"target_ref": "x-misp-object--808e6a5f-a93e-48f1-8678-d5f32b61f516"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c791a408-abda-4371-877e-e074d8c64ca7",
"created": "2018-03-13T13:55:59.000Z",
"modified": "2018-03-13T13:55:59.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--86a9886d-1f0c-48e5-978c-8f96df99efed",
"target_ref": "x-misp-object--980fe535-bfc5-45db-979a-1c6e45bfa4b4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a8cd0c52-3d1c-4e05-b8bd-54dc7c3679e5",
"created": "2018-03-13T13:55:59.000Z",
"modified": "2018-03-13T13:55:59.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--991239b6-a59d-4891-9365-3297334f53b8",
"target_ref": "x-misp-object--e5931a6d-c9d6-4c85-9184-45c54d0896e5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a45a67e4-680e-4e21-904a-57fe8e4452d4",
"created": "2018-03-13T13:55:59.000Z",
"modified": "2018-03-13T13:55:59.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--af070041-9ff6-4592-b8f9-c8321cb360ab",
"target_ref": "x-misp-object--3b6371b2-89d5-4271-ada4-05f54fd4ceb7"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--97d9651b-1a5f-45e0-947e-166c7969b393",
"created": "2018-03-13T13:55:59.000Z",
"modified": "2018-03-13T13:55:59.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e518371a-6ff1-4160-86db-52fd485c75ed",
"target_ref": "x-misp-object--16b70a36-22ec-44de-9284-c8513068cae6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fd2e945f-0180-4ffc-86b1-5a80a8ee4cc4",
"created": "2018-03-13T13:55:59.000Z",
"modified": "2018-03-13T13:55:59.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--774d6ed8-303c-4a84-935d-f3ac619f4e8f",
"target_ref": "x-misp-object--dc1da038-6340-42d1-ba26-176fe9bcded0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--90ab72b0-2e60-4e09-a956-1642b922d7e4",
"created": "2018-03-13T13:55:59.000Z",
"modified": "2018-03-13T13:55:59.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f6f9fee4-876e-4765-ac1f-923a8e449811",
"target_ref": "x-misp-object--6c106bd5-9842-4461-b8dd-0faa223d2c68"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--570d89e2-0e76-44e1-bfad-32422532c795",
"created": "2018-03-13T13:55:59.000Z",
"modified": "2018-03-13T13:55:59.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ef7ab321-e2e2-45d6-a76b-ed61d6ccbdba",
"target_ref": "x-misp-object--fccef241-584e-4a8c-bcac-44550ac946a0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--517defed-cbd9-4160-b005-5f2409319cea",
"created": "2018-03-13T13:55:59.000Z",
"modified": "2018-03-13T13:55:59.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--972390dc-b051-4c4f-952a-2daca6c94e2a",
"target_ref": "x-misp-object--6d2857f8-cde7-49a7-86f7-27711cde2de0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--03993976-a9f6-44f7-a873-d0da05c10d57",
"created": "2018-03-13T13:55:59.000Z",
"modified": "2018-03-13T13:55:59.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6c18de88-4e54-4aca-8333-7b6002fc6581",
"target_ref": "x-misp-object--3fe466f9-e2a4-4cd9-85fe-b5985c458e79"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6a0c65dc-72de-4e48-ad42-d0583b5753c1",
"created": "2018-03-13T13:55:59.000Z",
"modified": "2018-03-13T13:55:59.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c0777536-9c34-4420-ad25-8a811bf2948c",
"target_ref": "x-misp-object--eeac1674-b2c3-403a-af56-098d62b62f9d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0407a976-74a0-416c-beab-67b8d5ca661b",
"created": "2018-03-13T13:56:00.000Z",
"modified": "2018-03-13T13:56:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ad0bbb06-2204-4a91-a97c-85d1f2c8bedc",
"target_ref": "x-misp-object--c511bbf9-ee03-472f-9275-86e54f87e603"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c40c727b-b70d-4f67-b95c-e49890494d0a",
"created": "2018-03-13T13:56:00.000Z",
"modified": "2018-03-13T13:56:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--181cb412-06ff-42e2-9e5c-f3b5a7f11780",
"target_ref": "x-misp-object--d09085d8-c050-4efa-8e91-586e9207ef3c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3cece2cf-a34c-40e4-bc14-eacf97c8a1ed",
"created": "2018-03-13T13:56:00.000Z",
"modified": "2018-03-13T13:56:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7fadae6d-0f96-456c-8717-ce5168fcd964",
"target_ref": "x-misp-object--5978498f-332b-46d5-ac8b-5da2f33ba5fc"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--760ff314-c5b9-428d-ad85-ab4246a1981e",
"created": "2018-03-13T13:56:00.000Z",
"modified": "2018-03-13T13:56:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--84d40159-8f0c-400c-8d61-34ea3ee11fd5",
"target_ref": "x-misp-object--fa3049b4-4fb2-4010-b3d6-df251f5e601d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ebe4592f-ee12-4231-9265-f2dcd35011fc",
"created": "2018-03-13T13:56:00.000Z",
"modified": "2018-03-13T13:56:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--97613f9a-68d6-4e2b-92a4-99963309ce91",
"target_ref": "x-misp-object--be1dbba5-f49d-4dc9-b130-19e084d25584"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--796d2487-bfd5-4f05-8e00-d920fb16f395",
"created": "2018-03-13T13:56:00.000Z",
"modified": "2018-03-13T13:56:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9850420f-b885-45a9-a6e2-af2380c164a7",
"target_ref": "x-misp-object--09920e57-e715-4c54-b158-9a9ee4b11723"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e6699688-1d1c-4d40-a92e-3138495ffa11",
"created": "2018-03-13T13:56:00.000Z",
"modified": "2018-03-13T13:56:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e4a8088c-bb92-4cff-9775-8f2369d9c9d7",
"target_ref": "x-misp-object--5850fabb-73d0-4f76-a406-a6f7e27b0b09"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5a46f59e-da37-4d04-ad91-1d211ab3d325",
"created": "2018-03-13T13:56:00.000Z",
"modified": "2018-03-13T13:56:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e60f450e-6f03-470e-9126-dc098b8138a0",
"target_ref": "x-misp-object--eef7f7bc-bb25-4b04-9930-1d76137be36e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1ee318eb-b3ac-4c3d-ad89-a4ce6d47b5f9",
"created": "2018-03-13T13:56:00.000Z",
"modified": "2018-03-13T13:56:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--110e5750-cf74-4fe0-9af7-59757472d6e4",
"target_ref": "x-misp-object--c2a69426-1e1e-4522-b6dc-a3833d75a33e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--126bf721-a70c-426d-993e-b575caa8fc97",
"created": "2018-03-13T13:56:00.000Z",
"modified": "2018-03-13T13:56:00.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--60afce5d-2b5c-4c36-ab17-ab9544a2744e",
"target_ref": "x-misp-object--b80f6804-4169-4522-825b-985b9349fabc"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4e8e432c-5b5a-43b7-98bb-8a0c1f3c905f",
"created": "2018-03-13T13:56:01.000Z",
"modified": "2018-03-13T13:56:01.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--20408dac-7c98-4bcf-bd33-a53de3436da3",
"target_ref": "x-misp-object--9a547937-9c10-4da0-8147-fa1e898ed8bc"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c15c3dca-37b0-4c50-ab5a-2faf10f31649",
"created": "2018-03-13T13:56:01.000Z",
"modified": "2018-03-13T13:56:01.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b9ebd188-91d8-4229-8b64-13d8daa59f3e",
"target_ref": "x-misp-object--d6008b30-2b4b-4d67-b609-7d7a5604ab1d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--daa8fddc-8405-4241-a8ef-7b460714730a",
"created": "2018-03-13T13:56:01.000Z",
"modified": "2018-03-13T13:56:01.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--682d3605-86dd-4f7e-80f2-a99ad1dd4e70",
"target_ref": "x-misp-object--d94c34c7-d78d-4d62-82e9-911bc6d298bd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6e8fc2fb-8b63-4b5a-ab38-304058229bbe",
"created": "2018-03-13T13:56:01.000Z",
"modified": "2018-03-13T13:56:01.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1a99a2de-2373-4621-a8fb-3810a2d1e0b3",
"target_ref": "x-misp-object--1d9c8849-48b1-4c5a-86c1-23c30aa5bd85"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b925d1b1-fb5d-4ccd-91ba-f2ea12fa8eab",
"created": "2018-03-13T13:56:02.000Z",
"modified": "2018-03-13T13:56:02.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--98b8fd89-339b-4f7a-ab5b-9c386741f7f4",
"target_ref": "x-misp-object--a255438b-ec32-4257-8de6-dc7a054f4126"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--59af7bb9-d59b-4008-bb55-d7bba51c5785",
"created": "2018-03-13T13:56:02.000Z",
"modified": "2018-03-13T13:56:02.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--639a5e0f-c87f-4c39-bb1f-0443c6fe085f",
"target_ref": "x-misp-object--b70cf9ce-61c3-4cc0-84d1-d2848d3e98e8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--82fb5206-50a0-4faa-8c68-1dd34b23e0f0",
"created": "2018-03-13T13:56:02.000Z",
"modified": "2018-03-13T13:56:02.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--baf077d1-6aca-4cbc-ba3f-33bda3b9411b",
"target_ref": "x-misp-object--712481dd-995d-491f-b929-5e3322c631ec"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--96a9df29-730b-4312-9454-3710b7dead34",
"created": "2018-03-13T13:56:02.000Z",
"modified": "2018-03-13T13:56:02.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--13d8d248-26dd-4144-a295-f5359295233d",
"target_ref": "x-misp-object--2a7d70a1-7b62-4ab4-8e52-eb2580366dfa"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--bee4dce2-cf07-452c-84a2-e8019afb1423",
"created": "2018-03-13T13:56:02.000Z",
"modified": "2018-03-13T13:56:02.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--be3b992c-a86f-4e3d-a44b-1e319fa67c66",
"target_ref": "x-misp-object--34447c7d-838f-4cb6-b8d0-0a9f0a0af702"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9567e0bd-0484-4b9b-b523-92c0fa1f6178",
"created": "2018-03-13T13:56:02.000Z",
"modified": "2018-03-13T13:56:02.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2bd8f5ed-adf0-45ff-ada9-9bed3a4060ae",
"target_ref": "x-misp-object--ac8f6787-b5f5-4ee6-b1a0-0b303f34ab29"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--74450df4-d8f1-45fc-80ca-0e22114eccab",
"created": "2018-03-13T13:56:02.000Z",
"modified": "2018-03-13T13:56:02.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c41a3658-a663-4d02-96a1-31891e0a2b70",
"target_ref": "x-misp-object--0bdb8b75-3f37-4741-b0b9-5c45ed8f0468"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5e4a1035-2fe8-4860-b17e-d16c90321a49",
"created": "2018-03-13T13:56:02.000Z",
"modified": "2018-03-13T13:56:02.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d68f2720-4b5e-4632-a07c-161efaa36753",
"target_ref": "x-misp-object--62a200f5-ada3-489e-8be4-0f841b49ccf1"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0f796b0b-9f92-4bcf-a047-e11258665b1f",
"created": "2018-03-13T13:56:03.000Z",
"modified": "2018-03-13T13:56:03.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2d4e2c18-2028-4f1e-a670-a518a678dd03",
"target_ref": "x-misp-object--9e3d433c-19c8-471a-a95e-f645423a88c3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--df822842-763f-465b-8171-875ed8ee5915",
"created": "2018-03-13T13:56:03.000Z",
"modified": "2018-03-13T13:56:03.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1656bc8a-bb59-41ee-b95b-4d8c7709675b",
"target_ref": "x-misp-object--93704ecb-f463-4722-92f8-61dea8ddeb24"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--bd2d5f2d-f109-462a-ba56-f4de0ae564fb",
"created": "2018-03-13T13:56:03.000Z",
"modified": "2018-03-13T13:56:03.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--cf0a1d5f-2e78-44fb-8ca1-850ba3b02c9b",
"target_ref": "x-misp-object--ee2d4946-ea46-4614-929b-b892f9908209"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ee63780c-194b-4cb5-b273-5dae45d2d302",
"created": "2018-03-13T13:56:03.000Z",
"modified": "2018-03-13T13:56:03.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ee5ee3f3-5de5-420c-a078-ecb7b097731d",
"target_ref": "x-misp-object--db8dfdee-1040-4e3e-9c50-bafef41f9cd8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--04d61206-9070-4815-81bb-8250d32f5d14",
"created": "2018-03-13T13:56:03.000Z",
"modified": "2018-03-13T13:56:03.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0b5f6c32-9395-4cbd-a0bf-dd0d0530e2a8",
"target_ref": "x-misp-object--33eda59f-9e49-43f3-958d-a55e2a6f1166"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cb3a5d9c-56f4-4aeb-87ef-1d9a2433316e",
"created": "2018-03-13T13:56:03.000Z",
"modified": "2018-03-13T13:56:03.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c1fb6054-0e84-4bb2-a205-389fc558673a",
"target_ref": "x-misp-object--40779d2d-1039-423f-a494-825d7952460d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6ba40abf-4be2-46e3-b118-486454f541ca",
"created": "2018-03-13T13:56:03.000Z",
"modified": "2018-03-13T13:56:03.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e77be68c-627e-49ae-97d4-e0905966779f",
"target_ref": "x-misp-object--e15aae65-2ce2-4bf1-bf9b-bf0b5f6a4b42"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6f034392-31ee-413e-bb1c-95281dc5a07d",
"created": "2018-03-13T13:56:03.000Z",
"modified": "2018-03-13T13:56:03.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4d96769c-72ab-4627-b0d4-d0340cd5afb8",
"target_ref": "x-misp-object--6a64e291-db27-4ab7-a4f1-d219c2d4a213"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--567f4b46-88a3-434f-856c-57692af5dc46",
"created": "2018-03-13T13:56:03.000Z",
"modified": "2018-03-13T13:56:03.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--03ca8515-5a71-4777-af1a-d1ff1d6e5a8c",
"target_ref": "x-misp-object--0adc6624-4217-4fff-8afc-70515da5eb04"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a3a28b87-9aa7-45d1-83da-ba255c2aeb70",
"created": "2018-03-13T13:56:04.000Z",
"modified": "2018-03-13T13:56:04.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b842ab6c-0657-4c07-b5d6-7d84cddd0db5",
"target_ref": "x-misp-object--41092416-53fd-4ebc-9dd7-c561b27c71d3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8c9b923a-305a-4f81-8e2c-b17ba6d84a3f",
"created": "2018-03-13T13:56:04.000Z",
"modified": "2018-03-13T13:56:04.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--501eb9d3-d927-4981-9a70-029446f915cc",
"target_ref": "x-misp-object--f7f485cf-39d2-496d-8559-26ac32cf9a49"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--418f9e40-b1d2-4208-a5c5-23cc46a1b80a",
"created": "2018-03-13T13:56:04.000Z",
"modified": "2018-03-13T13:56:04.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--471a7dbf-92c0-465f-ba18-05dfb063b09e",
"target_ref": "x-misp-object--df430360-e730-4f9f-bc3e-686429c7583a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--001ae911-190f-41ef-9124-a662a5bc5832",
"created": "2018-03-13T13:56:04.000Z",
"modified": "2018-03-13T13:56:04.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f01594da-861d-4f87-b396-47514fa8363b",
"target_ref": "x-misp-object--0b79ea19-b0d7-40b9-8776-a2a016033403"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d1581715-2279-4faf-a256-b201da93c417",
"created": "2018-03-13T13:56:04.000Z",
"modified": "2018-03-13T13:56:04.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--dfa0759a-c600-44e9-9876-9917c0a250b4",
"target_ref": "x-misp-object--5839cd4b-1637-4bb9-bb4f-d47ebed941c9"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--303997b5-a8e0-4b73-aa1a-432010e28abf",
"created": "2018-03-13T13:56:04.000Z",
"modified": "2018-03-13T13:56:04.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6b548802-ebdb-43a5-9401-d2f8f3028d08",
"target_ref": "x-misp-object--4d3b0767-ca9c-4a59-b2b6-6b5d45774032"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--87d82a35-f28a-43a8-8ef3-b3e947e3cae1",
"created": "2018-03-13T13:56:04.000Z",
"modified": "2018-03-13T13:56:04.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bb56a8a6-e4d3-42d0-833f-e4361b54331a",
"target_ref": "x-misp-object--4d05714f-a5ef-4d4f-a006-8f30c4f980b6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--43907ed3-e9de-469f-b00e-d4639e12a924",
"created": "2018-03-13T13:56:04.000Z",
"modified": "2018-03-13T13:56:04.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1830e8c1-fd3c-4bf3-a1c8-62552d336b81",
"target_ref": "x-misp-object--8dc0fa9d-8101-4cfa-a7ca-708ad1e8641b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f24ddbc3-0e24-4c6d-96f7-b4f9fb81476a",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0f99173c-5e8d-4184-9112-90283901d5a7",
"target_ref": "x-misp-object--8f9ecfd9-d95a-4499-b479-443b63588110"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2742056c-652f-4dd1-b2f6-1b5af89b1389",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--34be655c-ccbd-4123-b790-0e89cdaed85d",
"target_ref": "x-misp-object--86b97a0a-ae05-4885-9931-5adfba823b6e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c8cb68fe-3baf-4401-9cef-a7438a83734d",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2f9ea31a-b956-4e72-9a09-e16343cfbff6",
"target_ref": "x-misp-object--c298d324-80ca-47b6-839a-8194f675280e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--74d12f63-d0bf-4c2b-a2ea-dc6e2b0ccee6",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4b8152a1-9434-45eb-b87c-1e63940242d9",
"target_ref": "x-misp-object--3a193c9f-2212-4f1a-a4c5-4ad4c34c83c5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ff909ab0-b6fc-40a0-9953-951903021705",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8d352130-43c7-45ed-8071-f107683e85e2",
"target_ref": "x-misp-object--826f69c0-6353-407b-959a-6db753aa04cc"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--31baa216-4f2c-4ba5-bf4a-79883801d585",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--20c88590-7576-4c24-9aee-62d7609cbe8f",
"target_ref": "x-misp-object--e3268eb8-ff83-4c94-a785-62496de9011d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--bc54994b-7f80-4ca7-81bf-14bfb06553a5",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b138ff77-a9a1-4c08-bafe-29b0523b4ed8",
"target_ref": "x-misp-object--633551b4-10c9-4b6f-9016-48b408fe38a4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--338ad0fe-a37f-42de-b09e-42c4756f970e",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d66b5ccd-9abd-4f3c-9568-1d70c53d9bc7",
"target_ref": "x-misp-object--e778b89e-a884-4832-abde-6ce011251693"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--67044d40-802d-4f39-9c93-225f76bb4377",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0892831f-a928-4d72-8fce-54a4e11fb7c2",
"target_ref": "x-misp-object--c1f6c155-6147-4028-ba1b-a80b9dd7ba04"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5c551e79-de08-4e9f-b237-fa9ae723dca8",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--db1caacc-9b02-4c97-91a3-e53e3e1a06dc",
"target_ref": "x-misp-object--43e01f3e-90be-425d-8ec7-de09b4b709be"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3641fc36-74f6-43df-88d8-7c32e463f744",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--67b2d93a-98eb-4c8a-9d16-4ad49b550d26",
"target_ref": "x-misp-object--3df48692-1aae-44e5-ab1d-8e3f51964c1a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d33bc253-e075-4929-b2cd-1390da8feeee",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ae30abe7-aaf5-43b8-9a86-da761337167a",
"target_ref": "x-misp-object--c8abd4d3-60c6-4618-844a-b449f10e295b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--bb6026c5-f7e2-4044-8372-527195a14359",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--020da26b-fa49-4c8b-8c1f-1e9c9720417a",
"target_ref": "x-misp-object--4b92ac74-45c4-4016-834b-d2bea2aa65e8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--41ba3ec7-2d8e-4f00-ae98-7958eeba66ad",
"created": "2018-03-13T13:56:05.000Z",
"modified": "2018-03-13T13:56:05.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bcfb9a53-5b69-4ac4-a2ef-18fef63ea165",
"target_ref": "x-misp-object--e49d9375-8dd5-4055-89fd-07955351f316"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4b2db794-95e9-4563-a829-33af4c2454ed",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c008b064-faae-4e2d-b895-7a3386442500",
"target_ref": "x-misp-object--6b181382-5e85-4d8d-8841-f7d56ba607a5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--bf93c659-edc4-4635-b65c-17f72ad43de3",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a1d90f3c-1df4-47d6-a972-60df22e745d9",
"target_ref": "x-misp-object--6477d441-4a92-4916-acd4-43b19d16a375"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--24bdcddd-6dd9-48c8-8aec-563df89252a4",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--83c71c43-77bc-4dc1-9ac8-164993129370",
"target_ref": "x-misp-object--1e276f55-5833-4810-8bfc-bbf15fb87297"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e3373543-e0b0-4a3e-8eb6-4ddb95fd85bf",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d66b49cb-0f4e-4fcb-8233-a006348455ee",
"target_ref": "x-misp-object--b7668932-8d26-4ac2-af13-2ed08885bcd6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--246d6980-a678-4ccb-9801-0fcc9caadc9e",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e9d100a3-05ab-49d1-b1c9-0e8f2383befa",
"target_ref": "x-misp-object--b35d1dc0-4300-4cc1-902a-5d9b046400df"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8975ed88-3e1e-4be3-9930-5dbb9a839554",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--fe995598-bd9e-409f-8ea4-c08712c1b9de",
"target_ref": "x-misp-object--10484feb-f108-437b-9229-acfc6b10217a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7c9f58a4-8aa9-4aca-ae04-c2d19449587a",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ed1c5751-bee4-4a8c-97d2-a0073741bbe5",
"target_ref": "x-misp-object--72f27ad6-4f8e-4276-b7fd-287b9d809f48"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8ef9c650-d2be-4ac9-b137-62e8ef9f9b3b",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--42a8a23c-9b54-4482-8a50-046820505d98",
"target_ref": "x-misp-object--5fb36872-a865-41f8-bb2c-3aa9e2706869"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4fa781a1-5049-46f5-a94a-2fe7a3b2af6f",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7ed9d6ef-d823-437d-8281-4c9949d2b6b0",
"target_ref": "x-misp-object--7f6d2249-26cc-4a41-8db2-19b133559d95"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c920610a-4034-470e-a0aa-443d6f3ba573",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9495bd5e-39d9-40da-951a-008a0f307829",
"target_ref": "x-misp-object--7a0ea506-37ef-4646-97d7-5574970b30b6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--bf0d1dc2-9038-45be-8bd7-9a585a762e64",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2f57ac50-c7c9-4a20-b794-a714dc18fd80",
"target_ref": "x-misp-object--43401fe1-3ad8-4d5e-ae34-03c4e6b1187b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4827a560-7b7d-402b-a188-651bab777c7a",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--174ec337-9a50-4f85-8127-3a95078ecd00",
"target_ref": "x-misp-object--9e6aba26-4bc6-4749-9af1-5e33710786ba"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2685d0d3-7a59-4e8f-85da-5e9e6acc9718",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d60d4a1a-e213-4e2a-a245-02347da28512",
"target_ref": "x-misp-object--87acea24-f544-414b-9337-4aa282031caa"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3324e196-166d-47d5-9b5c-d8b200c9e0aa",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7f797fe4-795e-4152-94a5-ca85ad81e2e9",
"target_ref": "x-misp-object--0df2e9df-4106-48f7-9f4f-6bf91b431e11"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--64a3b9d1-5a30-4333-810b-98e52095cd24",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--46998b72-d9b5-4392-868d-0c843d34fc00",
"target_ref": "x-misp-object--f98f0864-6f07-45b0-b0f4-0c88c07dffb0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fa63c97b-3a7b-42ac-8ef1-e87d0b536f76",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--80685b00-a882-4132-9551-286ab3b430c2",
"target_ref": "x-misp-object--bbdca7b6-37ed-4ae2-aace-f71b4c8ac0c0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cdeba8a5-ebce-4a75-a328-c7f5f3222c9e",
"created": "2018-03-13T13:56:06.000Z",
"modified": "2018-03-13T13:56:06.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2f15384f-e5ea-4e02-851b-9ecbf3508149",
"target_ref": "x-misp-object--f1bdcb12-3b65-4f80-8ee4-063b9b5b66f7"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6583b8c3-98c0-47d6-9285-0770c0e2201d",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2b0031ea-445e-4619-98be-8c0059ec1b62",
"target_ref": "x-misp-object--3bbcd9ed-3e47-470c-b431-e70443010365"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--90432b69-7690-4e93-8a5b-8a5fd45c5649",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9a1ed464-4795-470b-820d-77ebba0fd9de",
"target_ref": "x-misp-object--8e4dd566-7edf-49a9-8dc7-294cd59c3b80"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--763262c8-9a8f-451e-96d5-82b03cabdf92",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--436515ee-125b-445a-b9bd-0326cc980910",
"target_ref": "x-misp-object--7b789516-52af-42e3-a4d8-402725bebbad"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0e06f07e-cafe-40b9-b10e-93563868b5a8",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c18d5005-8d30-4b08-8b79-5471964d2686",
"target_ref": "x-misp-object--aad037d0-ccc1-42ad-9e22-b00255d02d6b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6ca9bf23-abbd-4e01-ba7d-ebc053a331a9",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f21c8928-a0ce-47df-af6d-1dc4800e6684",
"target_ref": "x-misp-object--092b2e56-e71f-407e-ae75-1048d5d294aa"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5e2d4d9f-d712-4c3e-bcde-152c592abf94",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--26ed6d13-7ede-45a0-9d75-8484cbe26f82",
"target_ref": "x-misp-object--3bc35d8c-6cd4-4946-bde4-deae4dae2192"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ba31550b-2a97-464a-8d26-8f6c3f27cc60",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a378e561-df52-488b-8b61-9c31848fd405",
"target_ref": "x-misp-object--5d9c9579-9bac-42fe-b4d7-d2c99c2e7f26"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--20e9b211-7d9e-4687-bdb1-e04db24d06c4",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1fc063d9-da6f-49e5-9aec-04541560882f",
"target_ref": "x-misp-object--c66e9d99-b3ee-4276-9bc4-e16197dc1343"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9aa6f949-c179-46bd-9b7d-a404773e3545",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a2d020e6-f709-4ed7-9c48-90d666c9f95b",
"target_ref": "x-misp-object--164fe582-c64d-4e47-ae0d-a7dcd9ee6410"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b06a8863-bd71-40b7-b4bd-e5093a1d6263",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d012ed78-ce5b-4169-9631-e80bd8e8f78e",
"target_ref": "x-misp-object--039c4cb6-78a0-4ee5-89c2-4e3fbb5d9db8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c0eacaa8-68e7-473a-bbfb-63e7dfdf2d91",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f0892f76-ec4f-4948-b54f-a7e56ee990ed",
"target_ref": "x-misp-object--90685d7c-a0d2-4413-894e-7c1d95f10924"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e64e9ac8-0be9-44c9-a120-6cbfebe86569",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e55e7446-e0ac-4f7e-b4a7-7de1d3a96e50",
"target_ref": "x-misp-object--9c601eec-34f8-4883-ad4c-991beb9c5313"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--18141fe1-76ef-45aa-9c3d-d08e98d270a8",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f1bc257b-1f9f-4ffe-86be-35ffd892f3b0",
"target_ref": "x-misp-object--c7bfc277-b689-4282-a52b-723f92964fb0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--46b56280-6157-491c-ab8e-a44ce842af6c",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b9b8ff6a-80a9-40a8-aa1e-000583538507",
"target_ref": "x-misp-object--bc28e52a-d2b1-4db5-98b2-b78814197fd0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--da06c3d8-d924-4f4b-9941-34cac18816f9",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5557a9c2-2926-4aa6-9091-3871ebd874d7",
"target_ref": "x-misp-object--7888f078-6e6f-40d0-b426-fbf99c5e25ce"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9b5a51ce-9fd6-47e4-b72c-3e8d737ac1fb",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d9764fb8-d509-4b1a-9b6f-434bee32f6e3",
"target_ref": "x-misp-object--99b98df2-668d-495e-b127-d171c1d9d3c8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e1d08e5e-62f9-4fc3-bdce-26bc80a30a5a",
"created": "2018-03-13T13:56:07.000Z",
"modified": "2018-03-13T13:56:07.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--64348811-02d2-43c3-a49e-65a3d4491dcb",
"target_ref": "x-misp-object--521302dd-bf8c-4040-a8f9-026216bf0ada"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--16c5dd61-f76c-4909-98fa-310e750e28b2",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--56e47645-eac8-4997-a5cf-32192544f4ea",
"target_ref": "x-misp-object--f6103ca7-a9aa-454d-be10-d6fbc27699f1"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--92f61bcf-4319-4558-8a81-a1d9fe281906",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--31f4b6b6-e16e-41a5-9f5f-d451220d62f3",
"target_ref": "x-misp-object--2ae0b87d-3b07-4a7d-a8f3-280f94879967"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--83a5cee7-0735-44dd-aed2-054ffa364450",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--32d62c01-a77d-4a61-91e2-e479232e89fa",
"target_ref": "x-misp-object--f4223054-bc53-4228-92bf-02380266e4d5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8102d922-4da6-4f20-b173-2b6f80ff17c1",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bbeb2a80-fffe-4959-a634-6d1b92c27966",
"target_ref": "x-misp-object--68c69bf0-47b9-4ea2-8531-239821114309"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2528e442-343a-4fa3-8321-7beda44bff0a",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--fe568963-2dc3-417b-99e1-5ad9a83f40db",
"target_ref": "x-misp-object--df245559-1f77-4c8e-b92a-873b30f1c2d5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0fbc851b-8dde-4ddc-85fd-d0425aa01a9c",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--18dd827f-22e9-4c33-b517-6cbcddc95a21",
"target_ref": "x-misp-object--e6a3fa3d-87e2-45e3-af5d-d6991ae8e074"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5fb6416f-352c-4508-85c4-f5932948d204",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bd8efd15-6af3-43ba-84c8-eac4769883cf",
"target_ref": "x-misp-object--618d429f-6a91-4bba-892a-c719cf60cea3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9741dde1-7d12-4ef3-bf5e-28883e99091c",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--277f3ee6-3d34-4038-abcf-2499c69b02ce",
"target_ref": "x-misp-object--f4efd30c-0621-4634-a2ec-478ab941efca"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--bdf5ce0a-a730-4fa0-ab2f-c174b75cf5f8",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9478791d-a2ed-4bbe-866c-f36e552defdd",
"target_ref": "x-misp-object--837f0b81-3cbb-419b-82d8-2bb5de26578c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a47c3ff4-d080-4449-8d5a-ab29ddb79b01",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--25ac76f6-4ab3-4d15-a4e4-4c5536e0520d",
"target_ref": "x-misp-object--b8393ac2-5026-481f-82f1-db6fb4b48d28"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1d232cda-629b-4e7d-aa7e-67487d277ba6",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1270a24c-137d-42b8-8bb2-f327d09c62d1",
"target_ref": "x-misp-object--0bef6eee-e08f-4405-9ffa-7b98518e0fae"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--45e6400c-26a0-457b-b68d-9bcd60416e76",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--44a433bd-8cfe-4150-ac8d-16ca5a4982fd",
"target_ref": "x-misp-object--5bfacbe9-088e-452b-864b-e4e0071f5dd3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--eb7abdc7-dfc4-4f20-8e9f-63e1afadae90",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b80818b7-46c2-41f2-8274-9bd66c2441b3",
"target_ref": "x-misp-object--b55faed7-7aa6-460d-885e-2c47abff9462"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b5e5416f-282a-4e6e-a309-3f1e7fe2146b",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b1f1d953-5872-4004-bd05-9fa658e326fe",
"target_ref": "x-misp-object--dd23efa6-454b-4338-82cd-ff495fb2b32c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e7227332-e368-40cf-ae14-88d85aef30c2",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a20fd02a-a3bb-45a2-9cdd-537570f9d775",
"target_ref": "x-misp-object--9dc0eda8-c956-43e1-8bc4-5c88a5da9d9e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0ffc0d84-cce3-4182-a605-a2cb9381881a",
"created": "2018-03-13T13:56:08.000Z",
"modified": "2018-03-13T13:56:08.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2e2cb479-1811-4020-91b1-64206c1c3bf9",
"target_ref": "x-misp-object--a681ce5c-c6b9-4dfa-86df-b14f736d5727"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--54734d7a-c1a0-48c0-b489-a9c585501463",
"created": "2018-03-13T13:56:09.000Z",
"modified": "2018-03-13T13:56:09.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ca040b60-0f2e-42d9-9503-73c4fe312591",
"target_ref": "x-misp-object--4c3be041-e873-416f-a301-ac3f2e8ba8cd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--27881976-c019-4c7b-b91f-c50af4b7cb2f",
"created": "2018-03-13T13:56:09.000Z",
"modified": "2018-03-13T13:56:09.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--41cff4ef-ba06-42ac-a0a6-01e30418969e",
"target_ref": "x-misp-object--5f59b1cf-7051-497b-85ae-26bb254d7664"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5229f45e-0c37-421e-b41a-f4440d6da07a",
"created": "2018-03-13T13:56:09.000Z",
"modified": "2018-03-13T13:56:09.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1f9b7984-58b4-4bdd-9b7e-c2782de29504",
"target_ref": "x-misp-object--9c900612-9431-4577-8580-6099cfb0e4d4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--87b57445-da62-452c-9d12-2094d59bd29f",
"created": "2018-03-13T13:56:09.000Z",
"modified": "2018-03-13T13:56:09.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a731aeaa-5c51-454a-8690-3c7622717b8c",
"target_ref": "x-misp-object--dbba2e99-1c39-493e-b7f1-5e50c4b677dd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9d336bf8-6ce8-484d-9abe-e5fa4f92e310",
"created": "2018-03-13T13:56:09.000Z",
"modified": "2018-03-13T13:56:09.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--17f52d1f-c8ce-45c8-996b-38d624db86c9",
"target_ref": "x-misp-object--f48c3488-0954-4be2-972d-05c233558f73"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--816bae09-8f99-49ed-85fa-c4da6bafa724",
"created": "2018-03-13T13:56:09.000Z",
"modified": "2018-03-13T13:56:09.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ca0e53e1-d879-426b-9b6f-a60fc942957a",
"target_ref": "x-misp-object--85d876f7-0257-4977-9817-d92fe656f507"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b6dc0b07-94a7-4c6b-9007-11f3d44f276d",
"created": "2018-03-13T13:56:09.000Z",
"modified": "2018-03-13T13:56:09.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c95b1e9d-e2de-413e-9ffb-4b87f049250b",
"target_ref": "x-misp-object--83fe5578-3bef-44db-a66d-be68a3cbc329"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--81775e6d-410d-4ad1-84d7-55ae9f7fcacf",
"created": "2018-03-13T13:56:09.000Z",
"modified": "2018-03-13T13:56:09.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--06e88af6-9100-4e50-aed7-494831bf2a2a",
"target_ref": "x-misp-object--e24a4551-324f-44dc-a13f-3fea25676610"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3d4148fe-f1f3-4e74-9402-73d6ba71f4e0",
"created": "2018-03-13T13:56:10.000Z",
"modified": "2018-03-13T13:56:10.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--59eda1ba-179f-4293-bd44-50871517d08a",
"target_ref": "x-misp-object--d834c18d-a902-4c28-857c-4a0da7c92148"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b7199553-4126-43ec-8ed6-591f7907a96f",
"created": "2018-03-13T13:56:10.000Z",
"modified": "2018-03-13T13:56:10.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a2c02004-e597-42d9-8a99-a8e678e68dfd",
"target_ref": "x-misp-object--d575295b-27a7-4e8d-ae64-606955c6bcc7"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6f5451d6-f5a1-420e-a208-e9a945d889b0",
"created": "2018-03-13T13:56:10.000Z",
"modified": "2018-03-13T13:56:10.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--becac4fa-8cc6-4b3b-823f-cb2f413a18c8",
"target_ref": "x-misp-object--34023aca-655f-4916-b588-65ed3f78c8cc"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e0a78ae2-1488-4f15-9ad2-5519dcef2158",
"created": "2018-03-13T13:56:10.000Z",
"modified": "2018-03-13T13:56:10.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--df145429-2ca1-436f-b388-10fa744f43db",
"target_ref": "x-misp-object--6c998244-f800-48ff-98d8-3f232c8f21c8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7c1c2073-eac2-49b0-9892-a48d27cbbc93",
"created": "2018-03-13T13:56:10.000Z",
"modified": "2018-03-13T13:56:10.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--78f1fadb-c0cb-4ea2-8aec-0c43d2f960e0",
"target_ref": "x-misp-object--a0a0caae-59b2-41c5-b073-243c37515fba"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1000ee2a-39d6-4cca-af6d-7d0aaf45bf10",
"created": "2018-03-13T13:56:10.000Z",
"modified": "2018-03-13T13:56:10.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b1adda64-9a8b-4634-8e63-327e75d42eb8",
"target_ref": "x-misp-object--f7b56700-8e0d-4fb3-9a59-08cef7c60a30"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--97342f07-bd1f-4ccb-8504-4648a1de4644",
"created": "2018-03-13T13:56:10.000Z",
"modified": "2018-03-13T13:56:10.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ee11a006-60cb-4c20-b2db-27b8408162d1",
"target_ref": "x-misp-object--61bc1c8c-cd0e-4f35-87ef-c686650b7622"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e4a3ee0f-9675-424c-807d-9570ff285a74",
"created": "2018-03-13T13:56:10.000Z",
"modified": "2018-03-13T13:56:10.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--44b91ea0-d5c5-45b2-b85a-cf3d37d53086",
"target_ref": "x-misp-object--483cd876-ce01-40a6-a4d2-0f11987cd0da"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--398e5450-9a89-4735-96b0-956321234a1a",
"created": "2018-03-13T13:56:10.000Z",
"modified": "2018-03-13T13:56:10.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6b50419e-57d0-43b7-bc75-8c92995bea47",
"target_ref": "x-misp-object--8a1d430b-966e-4e9e-86f5-fcf619c3dc87"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ca94d3ea-4d13-4a10-b9d9-930cc1b00e77",
"created": "2018-03-13T13:56:10.000Z",
"modified": "2018-03-13T13:56:10.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--78c3f029-acfc-4d24-94f2-18058e811bd6",
"target_ref": "x-misp-object--73af1f83-a272-4099-b219-b05e77c7d7e1"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3cae300c-e22f-420a-9c19-702a0124863c",
"created": "2018-03-13T13:56:11.000Z",
"modified": "2018-03-13T13:56:11.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e2f6f53c-1b21-4f9b-ba9c-da35fc181c97",
"target_ref": "x-misp-object--e19b532c-dd5a-4278-ae1c-372d66b8b146"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7a104632-67a9-433c-8269-b7b9d52c1c93",
"created": "2018-03-13T13:56:11.000Z",
"modified": "2018-03-13T13:56:11.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7737ccff-f82f-494b-90cc-1b22e2c2b6b5",
"target_ref": "x-misp-object--0d6879bc-8075-4bf5-9a98-f06c6991f1ac"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6990971d-c1ed-4462-8f04-b2fa6b8a823c",
"created": "2018-03-13T13:56:11.000Z",
"modified": "2018-03-13T13:56:11.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--08609b6c-4c68-4ab4-8a22-8ce67ae5dd55",
"target_ref": "x-misp-object--1f4d6780-90cb-4281-95a5-6524ce6145d8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--97a0de67-4f1a-4b1d-b622-c6b8398a0045",
"created": "2018-03-13T13:56:11.000Z",
"modified": "2018-03-13T13:56:11.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2b485a76-ed4a-4832-8601-93576827def2",
"target_ref": "x-misp-object--bfe8c8f1-123f-4fbe-9a57-ca43bda77bbb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--901c265d-b66a-4ec0-8616-7a9ab3b649c6",
"created": "2018-03-13T13:56:11.000Z",
"modified": "2018-03-13T13:56:11.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ccb0100a-cc61-45c9-a42e-946b0b9a2bbe",
"target_ref": "x-misp-object--3d1d4143-fd00-4946-b5c3-227bf730b271"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3fe2c85f-65e3-4809-91f7-7aa773be66a3",
"created": "2018-03-13T13:56:11.000Z",
"modified": "2018-03-13T13:56:11.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d28c925e-1dc6-4915-8cc1-31b30c1d3d77",
"target_ref": "x-misp-object--7295e73f-9200-4da9-9cee-1235ab0ef8c0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7e33f0f7-63b9-424b-9c31-5a1a30110922",
"created": "2018-03-13T13:56:11.000Z",
"modified": "2018-03-13T13:56:11.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--031272c7-aeea-4886-bc0e-c82c2399ced1",
"target_ref": "x-misp-object--6279338c-1317-49e5-9fa3-61d39d1fd85e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8c1ec70f-0e4a-48c9-81a5-60e82d591335",
"created": "2018-03-13T13:56:11.000Z",
"modified": "2018-03-13T13:56:11.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--dd1b94ca-12df-4746-81b9-0f2762545592",
"target_ref": "x-misp-object--345cb4a5-817c-402e-8306-11ac04b71d83"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c0c6f74a-8286-40f4-8fe7-29ba759e33cb",
"created": "2018-03-13T13:56:11.000Z",
"modified": "2018-03-13T13:56:11.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2ac12e74-5306-4785-82c0-7ba96983994a",
"target_ref": "x-misp-object--b55def3e-7c02-45e4-8e38-55ae68cfc362"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--595d65ce-571f-42dc-993a-fed5c66bd2ec",
"created": "2018-03-13T13:56:11.000Z",
"modified": "2018-03-13T13:56:11.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b5b1d0ad-ca31-4465-b922-bc5cdda1fe8e",
"target_ref": "x-misp-object--bcd5c109-6f56-4f18-b58c-0866365f87b1"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ffab2464-4126-4f0e-aa14-7f29946d7c9b",
"created": "2018-03-13T13:56:12.000Z",
"modified": "2018-03-13T13:56:12.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3f19950c-9a19-4b31-8f00-1af92d3a1bc0",
"target_ref": "x-misp-object--1d20673f-8d52-47c7-9740-2ba5d4dfcb48"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cbbf43a3-e638-4955-8005-0d99e8cea792",
"created": "2018-03-13T13:56:12.000Z",
"modified": "2018-03-13T13:56:12.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4998219b-3f2a-4415-9120-aec6680e1e44",
"target_ref": "x-misp-object--80e03ba7-89f4-44f2-a0e4-6392a20743b2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--90799475-5376-4c42-bad9-5477d8fca974",
"created": "2018-03-13T13:56:12.000Z",
"modified": "2018-03-13T13:56:12.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bfdac829-84e7-422b-98b4-6c2668aa0587",
"target_ref": "x-misp-object--af568763-fed7-4558-9441-26b2cc6362b9"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6b86ac95-7450-4975-95c0-06f116275391",
"created": "2018-03-13T13:56:12.000Z",
"modified": "2018-03-13T13:56:12.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--86bad043-2708-431a-ba23-f83d6450e4ab",
"target_ref": "x-misp-object--35347bf8-788b-482c-b431-3b6258b1e9b8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2be60a59-6d1b-4e03-9193-74b574b3751c",
"created": "2018-03-13T13:56:12.000Z",
"modified": "2018-03-13T13:56:12.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8e08f62d-c431-4475-a0da-023c8f670606",
"target_ref": "x-misp-object--a3062c18-d293-46c0-9175-e3c86691eea4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0565e21c-782f-4060-a27a-40e357608ec7",
"created": "2018-03-13T13:56:12.000Z",
"modified": "2018-03-13T13:56:12.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--cb23222d-61f4-420f-97e5-208d0df4d905",
"target_ref": "x-misp-object--b3c43305-f706-4271-a3cc-9dd6a47f013e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--846761e3-4f50-4dc7-82dc-a2d11a03a278",
"created": "2018-03-13T13:56:12.000Z",
"modified": "2018-03-13T13:56:12.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--be84377d-270c-48ad-bd4e-797b86509254",
"target_ref": "x-misp-object--54a18057-87d9-4091-a8f5-e919a6af8f8e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0ae3683b-5c1f-4c06-95a0-7db0f5ddd8b4",
"created": "2018-03-13T13:56:13.000Z",
"modified": "2018-03-13T13:56:13.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b97217c8-a47e-418f-9dd7-089aaa3ad22c",
"target_ref": "x-misp-object--738e4e9c-f2c7-4297-90b3-6f559923bbf3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--881a4947-0c19-4c7a-87bb-9308a890f14d",
"created": "2018-03-13T13:56:13.000Z",
"modified": "2018-03-13T13:56:13.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e06f91b8-355e-4ea7-9de1-3aa5a3b948bc",
"target_ref": "x-misp-object--9f13752e-3013-45e2-90ec-6b5a99066505"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4224ef77-e4ee-4114-91bd-651f04402bc8",
"created": "2018-03-13T13:56:13.000Z",
"modified": "2018-03-13T13:56:13.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d294a9bb-d773-4cf2-8e2a-3fd99391206f",
"target_ref": "x-misp-object--f61c6948-4f4b-4145-af51-b50999bace44"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1a0d8177-33ad-44c6-9276-f1ba89579f6b",
"created": "2018-03-13T13:56:13.000Z",
"modified": "2018-03-13T13:56:13.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--82299055-ed80-4537-80f5-9436f519f766",
"target_ref": "x-misp-object--2d2f3ea6-6d2a-46eb-8fa7-fe52ec43d7be"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--87e86c77-a33f-4ca2-8bd3-2dd126fb7cbb",
"created": "2018-03-13T13:56:14.000Z",
"modified": "2018-03-13T13:56:14.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d6278a28-8753-4bd3-b5dd-b615a535c947",
"target_ref": "x-misp-object--e8b635f4-5d5b-4caf-9d35-c214b6dab867"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2399945b-54cd-4817-bf29-056280674f4e",
"created": "2018-03-13T13:56:14.000Z",
"modified": "2018-03-13T13:56:14.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--cb61ffc7-25b6-4635-af6f-bed3089af7e9",
"target_ref": "x-misp-object--804d7a0d-4a71-44fc-a954-6dc9def20bbf"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0466c82f-78d3-419d-b844-e10ec696fd9e",
"created": "2018-03-13T13:56:14.000Z",
"modified": "2018-03-13T13:56:14.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--cccbb05d-835e-45c2-8022-a743d3ad5851",
"target_ref": "x-misp-object--8d5816f1-dcb6-4f83-8356-64b3ec5b3ba2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--46c21bc8-62a1-473b-ba1b-0e175b35b8ac",
"created": "2018-03-13T13:56:14.000Z",
"modified": "2018-03-13T13:56:14.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d7d6852a-a95e-4d3a-84cb-06b3701e6a6a",
"target_ref": "x-misp-object--c3a835d0-178c-475e-8d29-863ad198edde"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6b1bd9ba-e588-4329-a87c-18c88f02035e",
"created": "2018-03-13T13:56:14.000Z",
"modified": "2018-03-13T13:56:14.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--82a15bb8-9f6d-407e-b744-bb8b9fee2159",
"target_ref": "x-misp-object--f2656df0-ab61-4366-972e-eb7ccf26e9f3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ee1e4376-f3c7-466d-81e7-95f5f4700152",
"created": "2018-03-13T13:56:14.000Z",
"modified": "2018-03-13T13:56:14.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--69820f4d-ae64-4f60-b206-e7f473a8bb57",
"target_ref": "x-misp-object--1712c055-825b-4483-a0d3-dfaa467814df"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e0e6e33e-2970-4709-9897-f7336aa75392",
"created": "2018-03-13T13:56:14.000Z",
"modified": "2018-03-13T13:56:14.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1244ab55-e050-4f27-8815-9829d0d09a58",
"target_ref": "x-misp-object--51b0df0d-f04c-4a11-8e09-bb63da256b07"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cbf860d7-b7dd-46f3-a958-2e153c900fc5",
"created": "2018-03-13T13:56:14.000Z",
"modified": "2018-03-13T13:56:14.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3308282a-8f19-47ed-81c4-f5f8cd8d007a",
"target_ref": "x-misp-object--cf6405fd-7401-4d60-a130-a6224cc18428"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ab924601-f070-4b91-8bfd-bb695cf10148",
"created": "2018-03-13T13:56:14.000Z",
"modified": "2018-03-13T13:56:14.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b7aed3f9-8bbc-49b9-96ef-1185d97372fd",
"target_ref": "x-misp-object--3e466307-8e1a-4b17-b923-67ccffe9fb67"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--88d0faf6-3ea6-4e13-9dfc-7341d1c17c19",
"created": "2018-03-13T13:56:14.000Z",
"modified": "2018-03-13T13:56:14.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--21b42c11-3463-4f2e-9cf5-dc2f947712eb",
"target_ref": "x-misp-object--5f436b33-8051-4e11-85ac-d19712b3b5f0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c10bdb94-b694-4a70-8774-0c54cf0091ae",
"created": "2018-03-13T13:56:15.000Z",
"modified": "2018-03-13T13:56:15.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--83a08501-1293-44f5-972c-a638468112d9",
"target_ref": "x-misp-object--4578fb47-f580-41dd-a90f-baa104b9d39b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--05e859ad-73de-4ccc-b306-e1f4118adbe8",
"created": "2018-03-13T13:56:15.000Z",
"modified": "2018-03-13T13:56:15.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--dfdd74ed-2446-41e7-bf1d-e876e277a29d",
"target_ref": "x-misp-object--57ebad98-e219-4c11-8ba9-e89e7c956763"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ff4fa802-f7ee-4c48-bed4-9a5c0494f259",
"created": "2018-03-13T13:56:15.000Z",
"modified": "2018-03-13T13:56:15.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9bc65993-ca59-4309-83d8-0444b2fb8c06",
"target_ref": "x-misp-object--af6df848-4958-4d51-b02b-f26f53e48132"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e3aca52c-a84d-465b-b9e1-578b134e1292",
"created": "2018-03-13T13:56:15.000Z",
"modified": "2018-03-13T13:56:15.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--978c6c81-588f-493c-b3db-a6d8a2a47990",
"target_ref": "x-misp-object--aea5d4a9-d27a-4a59-b732-317d060c8df3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--55e3db1e-d33f-402e-a89b-bc463deba274",
"created": "2018-03-13T13:56:15.000Z",
"modified": "2018-03-13T13:56:15.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b4ac89c0-7022-47ba-b5b6-b7d6f505aebd",
"target_ref": "x-misp-object--cea5961c-f56f-47ed-805c-8ead55535284"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--baac2606-4615-4308-8bb5-34f0319e1ab3",
"created": "2018-03-13T13:56:15.000Z",
"modified": "2018-03-13T13:56:15.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5c173e41-3f6a-45b7-8dc3-9fd00209ec77",
"target_ref": "x-misp-object--e8449b46-a354-467e-9e49-68031b6e1752"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2b6eb221-0d88-4947-bd6b-f2f9f8eba30f",
"created": "2018-03-13T13:56:15.000Z",
"modified": "2018-03-13T13:56:15.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--620fa80a-ff56-4958-893f-c9178f12924a",
"target_ref": "x-misp-object--f6d1820f-b409-4ae6-8576-398772a06e02"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--af05fc09-e1ba-4c66-97f9-4795b4bc5d3a",
"created": "2018-03-13T13:56:15.000Z",
"modified": "2018-03-13T13:56:15.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2b5a4323-cc12-4e0f-b80f-932c607e3061",
"target_ref": "x-misp-object--914a9489-58b9-4d1c-9bfd-c89783e85427"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--672a6771-6433-443b-ac6f-9a1c194a7628",
"created": "2018-03-13T13:56:15.000Z",
"modified": "2018-03-13T13:56:15.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5fa6a990-0c0c-45a2-b44f-8f6b2fb92d30",
"target_ref": "x-misp-object--29ed7fda-0038-4836-890f-220300a61011"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c8b2228c-3d22-4f17-8d12-161fd693206a",
"created": "2018-03-13T13:56:16.000Z",
"modified": "2018-03-13T13:56:16.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b8edda24-98d3-4d12-b8f1-0b075e5127e1",
"target_ref": "x-misp-object--f17b3e60-ddc8-4acf-9c1a-23484fb6bdb4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--533a5fca-33ea-4d0a-8892-cfb94fe1ee6b",
"created": "2018-03-13T13:56:16.000Z",
"modified": "2018-03-13T13:56:16.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--856f07d3-d2ca-4f97-bcc9-9c42047e154b",
"target_ref": "x-misp-object--e81ed941-5baf-4a9f-9478-1a82e2806177"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a46b0b75-71ab-4dd1-bfbd-31b30650aa88",
"created": "2018-03-13T13:56:16.000Z",
"modified": "2018-03-13T13:56:16.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--67d15086-8265-4536-835f-eacf118dbdcf",
"target_ref": "x-misp-object--4934a6eb-4335-4e88-ac95-11ec7ce3d651"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--58c070a6-cfbb-431e-b991-7e6fd962aa2a",
"created": "2018-03-13T13:56:16.000Z",
"modified": "2018-03-13T13:56:16.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--914b8dcb-39b8-41e6-9314-701cb1685d55",
"target_ref": "x-misp-object--c3b196f2-3089-4461-9f1e-e2ded8cc54fb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--47ddfa37-698c-4ac4-9419-538605bda25f",
"created": "2018-03-13T13:56:16.000Z",
"modified": "2018-03-13T13:56:16.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d2a0d57f-8bd4-4f7a-bd2f-558d1ccc9e42",
"target_ref": "x-misp-object--994a0748-7980-4a57-a95b-2ea57fd7169c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b8f6c368-7c15-4a9d-a429-d30a0a129aa6",
"created": "2018-03-13T13:56:16.000Z",
"modified": "2018-03-13T13:56:16.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--08a40cfc-aaa0-4762-9aec-343975e97a59",
"target_ref": "x-misp-object--7c08f3f9-329e-409a-b4e2-ee8071725fdd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c2e91b9f-89e9-4321-9b85-a3c237a0f2f1",
"created": "2018-03-13T13:56:16.000Z",
"modified": "2018-03-13T13:56:16.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d9defefd-c657-4cd9-b750-a295b80285fa",
"target_ref": "x-misp-object--70c8bcb8-ca3d-4852-b4aa-8638899816c6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e55d7cbd-7fb3-46f1-bb69-8e4f90e1226f",
"created": "2018-03-13T13:56:16.000Z",
"modified": "2018-03-13T13:56:16.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c227e4dc-e420-45cb-9f53-1126208d93ed",
"target_ref": "x-misp-object--cbca6d38-3a3d-4c08-bec0-22e39f71f2eb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0f5da1d0-ec0c-4420-81a8-0d3494c8d170",
"created": "2018-03-13T13:56:16.000Z",
"modified": "2018-03-13T13:56:16.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ddc8833c-f045-429a-9866-12bc325e4a8d",
"target_ref": "x-misp-object--8f991164-986e-4588-84a1-017fc4940631"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a8259402-990c-44f3-a36a-20dda914eb40",
"created": "2018-03-13T13:56:16.000Z",
"modified": "2018-03-13T13:56:16.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--413a18c9-945a-4bd1-b541-691bc530c2fa",
"target_ref": "x-misp-object--7e632066-66c8-4b57-844b-3e57c53c0644"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--73a7a9da-cfdc-4b56-a330-84ad8e8caf8d",
"created": "2018-03-13T13:56:17.000Z",
"modified": "2018-03-13T13:56:17.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5cf33f8d-dd97-4611-8b61-97b2763a0bd8",
"target_ref": "x-misp-object--b267d777-f810-4701-b57b-47643fe6e370"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3198784d-4c2a-4838-825f-c56ce30f6af4",
"created": "2018-03-13T13:56:17.000Z",
"modified": "2018-03-13T13:56:17.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8a341ca2-f68a-45ed-9c09-cacdac4e43ba",
"target_ref": "x-misp-object--949361d6-c71c-4ab9-b3b2-5fdef6a8549a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--91f101c5-b19b-4e55-bfa9-1d43407ec665",
"created": "2018-03-13T13:56:17.000Z",
"modified": "2018-03-13T13:56:17.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--05e14172-6a5f-4438-9cf9-18601485fee8",
"target_ref": "x-misp-object--718abdcd-3f1f-4652-9751-33a11b262a4b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--30d587a8-94da-4207-bff7-c1555202e2de",
"created": "2018-03-13T13:56:17.000Z",
"modified": "2018-03-13T13:56:17.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ac9429a8-1a38-443b-ac79-947e77c20362",
"target_ref": "x-misp-object--64350fec-6cfd-440f-82ca-f42b591d4a6e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--16a49acd-8134-46f1-a812-1720a1cd1b9c",
"created": "2018-03-13T13:56:17.000Z",
"modified": "2018-03-13T13:56:17.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--22d8e158-223c-4edb-b351-461809ff16af",
"target_ref": "x-misp-object--d8c73c7c-20f0-4816-8447-5bfa171455f8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--186de74d-efcd-4c16-88c9-f59234ef3ee9",
"created": "2018-03-13T13:56:17.000Z",
"modified": "2018-03-13T13:56:17.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bc5863ac-57aa-4555-91f3-f8cddfd3a380",
"target_ref": "x-misp-object--fd565702-5854-489b-9168-aa56033b44b8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--74303358-67ae-486a-b1da-7403d8b0f8df",
"created": "2018-03-13T13:56:17.000Z",
"modified": "2018-03-13T13:56:17.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--37650bda-445d-45fc-89bf-25645506db23",
"target_ref": "x-misp-object--adf2edf5-1bf0-43ce-bb48-03b0d632410f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e395671b-261d-42ea-947d-d92660089f1e",
"created": "2018-03-13T13:56:17.000Z",
"modified": "2018-03-13T13:56:17.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--12a9552f-dcfa-4b1b-b9a0-8577c5f592d5",
"target_ref": "x-misp-object--996697de-50d0-4c27-ae0b-f7cf1d789da0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9a504a20-02b2-4023-9844-56566fa162c3",
"created": "2018-03-13T13:56:17.000Z",
"modified": "2018-03-13T13:56:17.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--dc1da79a-987b-4226-998b-f6befaa03fb8",
"target_ref": "x-misp-object--1456abf1-55d0-43f6-9a4f-e91acc35882e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--890c088d-8857-4927-94fc-cd70573eb7a0",
"created": "2018-03-13T13:56:17.000Z",
"modified": "2018-03-13T13:56:17.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4775ae1d-ebf4-42ae-88cb-2d9e7b7e3485",
"target_ref": "x-misp-object--81d57356-7bd7-44dd-99fe-a227e1ac00ab"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--256fcdb2-1bde-44a1-bc74-0d612d6ee1dc",
"created": "2018-03-13T13:56:18.000Z",
"modified": "2018-03-13T13:56:18.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8d8f022d-7e99-4d4b-9999-3c7bb3331ded",
"target_ref": "x-misp-object--720e4a35-25aa-4682-91b8-74d26d2c83ae"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--01bfc442-0466-40ae-be21-50eda405d3bf",
"created": "2018-03-13T13:56:18.000Z",
"modified": "2018-03-13T13:56:18.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c0993f0e-c4c9-4607-8438-5f67688c20d6",
"target_ref": "x-misp-object--3ce18542-570a-4988-b75b-702cfa1a3c1a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fa6a42c3-418d-4902-9159-cc91ed80a9f8",
"created": "2018-03-13T13:56:18.000Z",
"modified": "2018-03-13T13:56:18.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--97971b0a-3559-409a-94ce-36fb05fbf4e6",
"target_ref": "x-misp-object--1627866d-dabf-4069-bbe2-355f3f0a9647"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ca2d1451-f91e-4f88-8ac2-68d21de617ad",
"created": "2018-03-13T13:56:18.000Z",
"modified": "2018-03-13T13:56:18.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0fa0b818-b2b2-482a-8567-cc8996d54f49",
"target_ref": "x-misp-object--816947c3-4298-4ae3-bb19-8e2b8986ad81"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ae8ed46e-963c-43d4-8315-13261f70ac8e",
"created": "2018-03-13T13:56:18.000Z",
"modified": "2018-03-13T13:56:18.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--66f170fb-5db2-4ede-ad9b-121ba032c974",
"target_ref": "x-misp-object--6af3ebc6-434f-441d-ae40-b876937c8612"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6f38fccc-cb1b-49e3-bc39-dd476b24f28e",
"created": "2018-03-13T13:56:18.000Z",
"modified": "2018-03-13T13:56:18.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--21046835-1b5f-454d-8fa7-a0d11e43314a",
"target_ref": "x-misp-object--5ffcf6a5-9852-4f0e-a619-c557f9bafee2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f1f1be8d-8b03-493a-9b59-94c5fcda73b0",
"created": "2018-03-13T13:56:18.000Z",
"modified": "2018-03-13T13:56:18.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bc18d46f-3297-462b-bcd7-6db52efaf56b",
"target_ref": "x-misp-object--fe44dcc1-5471-4572-aebc-7fc43c58831b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d1aef29f-154e-4d56-9fce-6fc0d2e341a3",
"created": "2018-03-13T13:56:18.000Z",
"modified": "2018-03-13T13:56:18.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9bff3672-c80a-4c16-b2cf-35a63fe86433",
"target_ref": "x-misp-object--8670cf25-98a7-42aa-9cc2-e2e9d90a037a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--34c266fd-7271-4441-8fb7-6b4496a4161a",
"created": "2018-03-13T13:56:18.000Z",
"modified": "2018-03-13T13:56:18.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4225cb42-201f-47ed-ad03-c0f4543cb253",
"target_ref": "x-misp-object--26451a75-cc08-4fbc-87da-436e2cde572f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3c3d9f35-a8c2-4044-9127-526005175ca3",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e43eb2dd-268c-4940-a19c-8c059cee8e40",
"target_ref": "x-misp-object--c336794f-46a9-4009-b240-e5cad850bb96"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6512f4d6-b4f6-4955-b1b5-88a8ce820ab5",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--da460413-76f6-41a0-a2b8-1542e365d0fb",
"target_ref": "x-misp-object--0677e0d0-8a8b-4754-bb9e-68525e65a9d5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--73913043-8782-41dd-a597-3e39d863b429",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0b4ad0cd-6a11-4eb2-a62e-85f88be78b2a",
"target_ref": "x-misp-object--49f5f1f3-16d8-4061-b055-0b6335db369b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a540d70b-fe38-4c57-ad53-b41e681f9f43",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--40314b91-c2b2-4eee-9c6b-2fe46238896e",
"target_ref": "x-misp-object--6e14b2cc-41af-4ef4-8810-6dcf339bcfcf"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0d1851f2-64e4-4634-845a-d93fd7b936ab",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8823252f-4421-4a25-b020-6c4d71b72f3c",
"target_ref": "x-misp-object--70eb97ff-b5cf-4a33-9c55-b66c838dc136"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1a005c78-7e51-4650-afa2-5f5d5ffb02e0",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4c585e51-1879-481c-a50b-8ecef2fbfee3",
"target_ref": "x-misp-object--13068af6-8ddc-4e99-a409-deda2159b103"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b00fa890-a684-4419-be70-f74c8890ec4d",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--37a19c4b-d0e7-42c7-9611-445522921890",
"target_ref": "x-misp-object--edcfd0af-4e00-4bf3-bfb2-f5e14e215c96"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8b5062f4-fd84-4cf0-ad41-a0e11935eb73",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1145dde9-b4a2-472a-9d5c-b9b6d48ed3a1",
"target_ref": "x-misp-object--06473880-41e8-46f2-b9c2-4cee0e116855"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6afcfcea-ed58-44b3-a942-05605391400f",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b3edef8c-598d-40e5-bb2d-18647024b51b",
"target_ref": "x-misp-object--fbbb0d5e-64de-4be0-90d7-a093afb63f88"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--234ccd8d-69dd-4d65-ac42-f7e1e377f169",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9acd5c23-ef98-40a7-bfc9-caf28c3f23eb",
"target_ref": "x-misp-object--aed42feb-e540-4b67-961c-f67718df57a6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--731faf6f-c670-4177-8e39-0216d294445b",
"created": "2018-03-13T13:56:19.000Z",
"modified": "2018-03-13T13:56:19.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ab226ccc-8a64-436f-ad9a-9be4b5777b0f",
"target_ref": "x-misp-object--44bf11f9-5d56-4ca4-882b-6702bcf34a30"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--994d3d31-9e5a-4e9c-9b1c-d856f6c3971b",
"created": "2018-03-13T13:56:20.000Z",
"modified": "2018-03-13T13:56:20.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--927f792b-19a9-4c29-82a9-b32675909be3",
"target_ref": "x-misp-object--0d77908a-f0f7-4781-97d2-246bdbee37ec"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--48a82eb2-af13-4257-95be-d6f1befb2b58",
"created": "2018-03-13T13:56:20.000Z",
"modified": "2018-03-13T13:56:20.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7a0a06e2-e651-4fd1-a48b-4b88352b1c4f",
"target_ref": "x-misp-object--1ecae68a-3fa0-46b5-9a9c-4ef390e211bd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--39b14fb8-043e-4f2d-b39c-b05e84d72814",
"created": "2018-03-13T13:56:20.000Z",
"modified": "2018-03-13T13:56:20.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1c2f9b9e-1a6f-42bd-93ea-8b0df438103a",
"target_ref": "x-misp-object--ffb0fd88-2cc2-46da-869b-788448ed5ca4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f043c189-8d3d-4ac9-a8b8-e6f4a86a15eb",
"created": "2018-03-13T13:56:20.000Z",
"modified": "2018-03-13T13:56:20.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--80c4fd2c-a08f-4ba7-bc29-6e29ea981bd0",
"target_ref": "x-misp-object--42229f3c-506e-45d1-88d3-4e2c9f27ccad"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--88eb20d2-434a-4150-9002-7706531c8bf1",
"created": "2018-03-13T13:56:20.000Z",
"modified": "2018-03-13T13:56:20.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8d8aeabc-15b4-40f9-9bc1-7b07df4455b7",
"target_ref": "x-misp-object--c7f784cb-512a-4528-b270-ea27855f4166"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1b6f4f0d-09be-4fbd-bcf7-f153581cc441",
"created": "2018-03-13T13:56:20.000Z",
"modified": "2018-03-13T13:56:20.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--509e750c-3a95-40fa-ad9b-76f22cdc492b",
"target_ref": "x-misp-object--030a8ee8-106b-4afd-9a08-f135111ee17f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0163e7e9-c354-4528-90f9-b23565ecb115",
"created": "2018-03-13T13:56:20.000Z",
"modified": "2018-03-13T13:56:20.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8aea02c3-b7ab-4049-a7d0-574248ffc5ce",
"target_ref": "x-misp-object--9fe05add-499d-4dd5-a632-7f6283f12006"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6347422b-5234-4c92-a6f7-e55ff9d9b4e0",
"created": "2018-03-13T13:56:20.000Z",
"modified": "2018-03-13T13:56:20.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9f4251f1-9409-47b5-a6ab-bb1b0eb81236",
"target_ref": "x-misp-object--a6c66b4a-943b-4095-89fe-af13049c2857"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7f1512ec-2fe6-4ae0-aa38-0568a338fe75",
"created": "2018-03-13T13:56:20.000Z",
"modified": "2018-03-13T13:56:20.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--627d360a-1b2e-450b-8fba-76deceb75528",
"target_ref": "x-misp-object--04de7a55-7030-479a-9a54-1b3b5857a7cf"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--607ef1c0-001c-44c0-bf10-9f1c7e5bcc15",
"created": "2018-03-13T13:56:20.000Z",
"modified": "2018-03-13T13:56:20.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d34ba1e1-ea64-48da-8df2-4ac0c83d2174",
"target_ref": "x-misp-object--64bec757-4f02-4661-be85-d133f1f916f4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8e15fa48-00bc-43c5-b65a-94f38bcfa5b6",
"created": "2018-03-13T13:56:21.000Z",
"modified": "2018-03-13T13:56:21.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--95d5d4b0-6b7d-4606-aad5-deffead81484",
"target_ref": "x-misp-object--8c3771ce-366b-4cfb-be18-490fef4a77e3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5c40b6d1-711a-4e62-ac77-895bfcb1e363",
"created": "2018-03-13T13:56:21.000Z",
"modified": "2018-03-13T13:56:21.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7e2b3829-7e79-4457-8c46-52cc0a4c135b",
"target_ref": "x-misp-object--7cfdff1a-969b-4132-81e2-91db2d53b935"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--22b92422-0572-465c-ba22-9c62f8748984",
"created": "2018-03-13T13:56:21.000Z",
"modified": "2018-03-13T13:56:21.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6b7e96a4-c224-4cd4-9463-0a4abfe1310c",
"target_ref": "x-misp-object--6d78971f-8ac5-459a-8e28-61152f4387f6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4f46ba2b-d560-476f-8b15-2f6579437c9a",
"created": "2018-03-13T13:56:21.000Z",
"modified": "2018-03-13T13:56:21.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6d443c89-c0fb-498b-b29c-f70a8e9b7441",
"target_ref": "x-misp-object--f7e1ca9a-c724-4270-b711-d7311d1bf670"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--09d4cf54-f9c3-4a9e-a147-748c1a05a041",
"created": "2018-03-13T13:56:21.000Z",
"modified": "2018-03-13T13:56:21.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8bed1326-1a1d-4928-8b15-a0b7ca1ee902",
"target_ref": "x-misp-object--49292793-cd90-46f5-826e-83edb402829d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4452d80d-64e1-415f-a572-7d7500b65c77",
"created": "2018-03-13T13:56:21.000Z",
"modified": "2018-03-13T13:56:21.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d1bc2cce-a622-49f4-aeb8-5b953ef057bd",
"target_ref": "x-misp-object--320498fb-361d-4be2-bf24-c44442ba1d43"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8c3e1539-10a3-4b4f-9582-a3b62af76f59",
"created": "2018-03-13T13:56:21.000Z",
"modified": "2018-03-13T13:56:21.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--139c2340-d819-4e2a-b7ef-5db4b5456996",
"target_ref": "x-misp-object--11fc4165-9256-452c-bd57-91eea67d52f7"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--2361548e-dc27-4b3a-9a33-9196c1fd4843",
"created": "2018-03-13T13:56:21.000Z",
"modified": "2018-03-13T13:56:21.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9a4100e0-80fa-4c58-8ea4-c72ae84eabea",
"target_ref": "x-misp-object--529f731b-28af-4b92-a2e5-02df29872815"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7c6591b1-e61a-4082-bfd5-2f3c35c8bcbf",
"created": "2018-03-13T13:56:21.000Z",
"modified": "2018-03-13T13:56:21.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--136020bc-9d22-4ff9-8ecc-0593daa5cdc9",
"target_ref": "x-misp-object--a0368a1c-1331-48d8-be77-72246033e74d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6c746fa8-c7d3-4d11-9635-c122d900d126",
"created": "2018-03-13T13:56:21.000Z",
"modified": "2018-03-13T13:56:21.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--df75d959-0373-4dcb-9d03-661b2e89367d",
"target_ref": "x-misp-object--dd4de532-cdff-43db-9b08-383978d10ecf"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--38023b01-4bdb-4825-a425-980dc8fd9ec0",
"created": "2018-03-13T13:56:22.000Z",
"modified": "2018-03-13T13:56:22.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7cf04113-a5ef-4039-a3e1-ffe4ec7290a3",
"target_ref": "x-misp-object--b9d2a895-a418-495d-a507-6ed53e60da61"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c87666f1-e85f-4562-9b3a-68e2ac55f042",
"created": "2018-03-13T13:56:22.000Z",
"modified": "2018-03-13T13:56:22.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2921db48-769c-4001-86d0-7f439fd5895a",
"target_ref": "x-misp-object--744bd821-f292-4972-a1c0-9ef1cb1501d8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--90aa0359-ab9f-4dfe-a819-08f29c953377",
"created": "2018-03-13T13:56:22.000Z",
"modified": "2018-03-13T13:56:22.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3b4dddf3-912b-4a36-a71e-036980f6e913",
"target_ref": "x-misp-object--7f3cc856-802d-426c-8c22-246dc019e2cb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--03ce1fe7-99ad-4bb4-8d7a-18e0bb3c7891",
"created": "2018-03-13T13:56:22.000Z",
"modified": "2018-03-13T13:56:22.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e12bb0ee-a69a-4146-b055-56ca6d2cc0fc",
"target_ref": "x-misp-object--9489f5d2-ff71-4fd0-815d-78330163a252"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--66e07e96-0d59-4f11-895c-9c4854f2bf89",
"created": "2018-03-13T13:56:22.000Z",
"modified": "2018-03-13T13:56:22.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2176c24c-867e-4722-a4f3-93baf925f23b",
"target_ref": "x-misp-object--01a3a067-3cd9-4ad4-9d0d-edcfaeff95e9"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--573850a2-7645-4b5f-88d0-d63e629a4276",
"created": "2018-03-13T13:56:22.000Z",
"modified": "2018-03-13T13:56:22.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d99541c3-21f9-4e43-a072-f9f348acc61a",
"target_ref": "x-misp-object--004be45d-0741-4968-86ee-422470e10454"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--aea3ee34-414f-4a38-ae3e-a1693fe5c3b7",
"created": "2018-03-13T13:56:22.000Z",
"modified": "2018-03-13T13:56:22.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d3259046-b495-487a-ba1b-213849af711b",
"target_ref": "x-misp-object--84bf6f44-a6f7-4787-b77a-8aa652de24d1"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--778c26b8-3494-4d92-b172-7b55109c9ba3",
"created": "2018-03-13T13:56:22.000Z",
"modified": "2018-03-13T13:56:22.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4b42b7ba-a997-4165-ba35-d68532e67774",
"target_ref": "x-misp-object--17a3fa4e-9caa-4187-a01f-829a2a81b273"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7e82e98a-29a6-450f-a363-7bfd15e2110d",
"created": "2018-03-13T13:56:22.000Z",
"modified": "2018-03-13T13:56:22.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--af041428-4279-46bf-93f7-95a9ae7e9ac0",
"target_ref": "x-misp-object--a4eaa802-abe1-41ad-8dd3-d0ce3294cb7d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3d9c7417-ec24-4c2d-83a1-8ed62b33b1f1",
"created": "2018-03-13T13:56:23.000Z",
"modified": "2018-03-13T13:56:23.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--908010cd-28a0-4f08-a7a5-69281f864864",
"target_ref": "x-misp-object--d989e4a7-23b0-46e7-813f-00cdf793e023"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f77d45f3-3b78-4bf9-9555-bb0e1f4a9970",
"created": "2018-03-13T13:56:23.000Z",
"modified": "2018-03-13T13:56:23.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2df4ad14-cdee-402f-9b29-66314a34cfca",
"target_ref": "x-misp-object--ae6eff32-1af2-4531-9939-8eefe6ee25dd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c41a783a-9a7c-4238-81b1-1ca69944170a",
"created": "2018-03-13T13:56:23.000Z",
"modified": "2018-03-13T13:56:23.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4ebe1cd8-46c9-4f31-a5df-525f4d91d446",
"target_ref": "x-misp-object--1c2bcd49-2485-4949-a704-8b12e30d65e3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1d19a51c-2769-44bb-8982-b2a30e83510a",
"created": "2018-03-13T13:56:23.000Z",
"modified": "2018-03-13T13:56:23.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b0da95dc-a85b-498e-a0f0-679b8220ab3e",
"target_ref": "x-misp-object--11c2e221-8fef-48d6-a2d4-9699d52ca330"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--82a5fbc7-8c99-4a3a-8713-263c94504a04",
"created": "2018-03-13T13:56:23.000Z",
"modified": "2018-03-13T13:56:23.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--fac77102-1466-4b49-af45-0081aa168519",
"target_ref": "x-misp-object--b430aab1-6ef2-4ec5-9720-0805c1640c39"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c3263730-eca2-4e4e-98ef-83658837e216",
"created": "2018-03-13T13:56:23.000Z",
"modified": "2018-03-13T13:56:23.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--45b7e720-e0f0-4621-89a8-be81720d360f",
"target_ref": "x-misp-object--2e00b881-7805-493f-9af6-3dd03df10987"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--527ba23a-7830-4eed-ad8b-ee9e9f81065d",
"created": "2018-03-13T13:56:23.000Z",
"modified": "2018-03-13T13:56:23.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3f8e9ff9-7ad7-4167-acc0-a2ceffd681c1",
"target_ref": "x-misp-object--b44e8fc7-c3df-4948-8559-55c3cfa79ffd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ed36c100-95f7-46d8-bc92-d9fc75cf41b8",
"created": "2018-03-13T13:56:23.000Z",
"modified": "2018-03-13T13:56:23.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d2507aa9-43ee-4889-aef0-76757a8cbd64",
"target_ref": "x-misp-object--dec03b16-27e2-4093-ab38-a00a27bc5a16"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--813ae0fb-bf41-492f-a243-6430812b15e5",
"created": "2018-03-13T13:56:23.000Z",
"modified": "2018-03-13T13:56:23.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0de0053d-c9e3-4ca6-90ef-f56a945de1d7",
"target_ref": "x-misp-object--49283bd7-ffd4-4c00-acad-f7b0e61e4a15"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b711937f-72b7-43df-8d8e-696b43f0b085",
"created": "2018-03-13T13:56:24.000Z",
"modified": "2018-03-13T13:56:24.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f188e92b-8a5f-4399-b9c9-e745b9398888",
"target_ref": "x-misp-object--f3765bba-c4df-4ada-9640-73b6b56bdcd0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--55f77580-c050-46ad-b1e5-c2c6765901e4",
"created": "2018-03-13T13:56:24.000Z",
"modified": "2018-03-13T13:56:24.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ee9122b3-2621-4f5d-8f22-6936733b76a2",
"target_ref": "x-misp-object--66faec5c-f35f-4310-ae76-b5d133c3d514"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--350e80a3-3499-4c24-a650-eefe6013cab3",
"created": "2018-03-13T13:56:24.000Z",
"modified": "2018-03-13T13:56:24.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5d5cff29-0013-4f58-a217-5ffc70a9b467",
"target_ref": "x-misp-object--8ba5aae0-fca0-4615-a91c-db32cf0e838c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--aa784a77-e71e-4810-bd38-58d2fe4668ee",
"created": "2018-03-13T13:56:24.000Z",
"modified": "2018-03-13T13:56:24.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d5de0f3b-09de-463d-85b3-3348fc8a6331",
"target_ref": "x-misp-object--2c00b6d5-4b71-4749-8627-c2f99359e324"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7e9eae16-7c26-40c9-a706-cf7f4b77a4d6",
"created": "2018-03-13T13:56:25.000Z",
"modified": "2018-03-13T13:56:25.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9e409b3a-5452-4c05-bdb6-83a7b07e379e",
"target_ref": "x-misp-object--ceebf3aa-a6a1-42f9-b4d7-bc07e1c353fe"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a503a6a5-336f-44be-9547-37410a00a281",
"created": "2018-03-13T13:56:25.000Z",
"modified": "2018-03-13T13:56:25.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a0a7273f-3c33-4691-8ebe-3ce2b0d33c72",
"target_ref": "x-misp-object--b8e6eadf-5c37-4201-9195-f248b9a9ea9c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--10c9d47d-8483-4e0f-8d8e-297c8b8dccf6",
"created": "2018-03-13T13:56:25.000Z",
"modified": "2018-03-13T13:56:25.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--43c21a39-d823-44b8-831b-c36317700f44",
"target_ref": "x-misp-object--6186ed82-e296-4016-b6ca-b6fefd19587e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--04f4034e-c656-41e3-8d63-c10c3be41a7a",
"created": "2018-03-13T13:56:25.000Z",
"modified": "2018-03-13T13:56:25.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b1fe42d9-2519-44d7-b1a6-87056aa9ec7e",
"target_ref": "x-misp-object--f994c47c-ea40-412b-8854-d748ec104625"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--bc6e6e28-33e5-4b03-9088-3ead5fead327",
"created": "2018-03-13T13:56:25.000Z",
"modified": "2018-03-13T13:56:25.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--399781fe-7ce3-48d4-836f-35080235fe53",
"target_ref": "x-misp-object--f08dfd7d-fe11-49fb-b4aa-29990ca09262"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--77f761b8-28b5-44b0-9b7e-25244d3faf4d",
"created": "2018-03-13T13:56:25.000Z",
"modified": "2018-03-13T13:56:25.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a8903b85-2d3f-4c0a-a072-de47670e4c51",
"target_ref": "x-misp-object--6336762e-38ab-431d-892c-11eb2ca40cae"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ff8f3a24-f7b1-4034-8926-affb0ee718b6",
"created": "2018-03-13T13:56:25.000Z",
"modified": "2018-03-13T13:56:25.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ca64f9b1-2a0a-4762-8f9e-65670a29d957",
"target_ref": "x-misp-object--c15a3bf5-7ff8-4325-af1b-f8cfc5ba01d2"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cbfd7a58-9bba-4daa-ac19-875daa628569",
"created": "2018-03-13T13:56:25.000Z",
"modified": "2018-03-13T13:56:25.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--10f161a8-d5a3-4e19-8ba6-31e105782123",
"target_ref": "x-misp-object--671f2cb9-b54e-4da9-bcb3-960d30dedcb1"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e47fadbc-a438-45ec-8029-fbdf51582fc3",
"created": "2018-03-13T13:56:25.000Z",
"modified": "2018-03-13T13:56:25.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--07bf697d-c098-4b87-acb7-f4634bc6638c",
"target_ref": "x-misp-object--4df2a5d7-3d89-4706-8ffc-c322b2069332"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9a5d5fb0-ecc4-49a3-9a14-ef0c6552fd33",
"created": "2018-03-13T13:56:26.000Z",
"modified": "2018-03-13T13:56:26.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4f394327-9de3-4f16-bd7e-67ae011e2253",
"target_ref": "x-misp-object--c4e37357-07eb-44fe-a2a0-dcb9ebfef7e6"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--069821a7-6fb7-4278-8174-35f3971fea24",
"created": "2018-03-13T13:56:26.000Z",
"modified": "2018-03-13T13:56:26.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3905e8e1-d889-4208-8cc5-e6f3b7f9056e",
"target_ref": "x-misp-object--41093629-a5d7-493d-8c2b-f479a8fa8529"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--990581de-2fd6-4264-b0e7-46848b0680cd",
"created": "2018-03-13T13:56:26.000Z",
"modified": "2018-03-13T13:56:26.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--80aa0c4d-56c4-4304-86c2-8a23da2f8ce9",
"target_ref": "x-misp-object--8bcd1506-8712-4d28-9a58-ca9647175c66"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e9cf0aec-5575-4b07-a582-0243d1233516",
"created": "2018-03-13T13:56:26.000Z",
"modified": "2018-03-13T13:56:26.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b5f6d323-9417-45f7-a465-2f585eda42b8",
"target_ref": "x-misp-object--45739206-d155-4d6b-af93-2f86cb8ac7dd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--86b6944a-f724-43db-aaea-31be935313c3",
"created": "2018-03-13T13:56:26.000Z",
"modified": "2018-03-13T13:56:26.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9d007af0-b71c-4b34-92e6-57a09987bbe2",
"target_ref": "x-misp-object--8da16671-3dec-4c2a-931d-e88fa1bdd9ee"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--39571453-e7ff-4979-84e1-cb777c95f601",
"created": "2018-03-13T13:56:26.000Z",
"modified": "2018-03-13T13:56:26.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--49b74b3b-9e5a-41c0-9cc6-1ceeaf82fe66",
"target_ref": "x-misp-object--3301e1c0-2d4e-4f28-944a-6c156a8eb79c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d70ded63-a583-4bdb-bdfd-370ea78f2b22",
"created": "2018-03-13T13:56:26.000Z",
"modified": "2018-03-13T13:56:26.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--895f0bf6-c013-48e3-8d00-7055d79eec53",
"target_ref": "x-misp-object--6d232c0f-d48a-4b00-8bcc-5d72e80bcacd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0c45a513-c853-4e25-afeb-e945ff77c1d6",
"created": "2018-03-13T13:56:26.000Z",
"modified": "2018-03-13T13:56:26.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1a3ff89e-aa94-4403-9b1f-c8b939f194f1",
"target_ref": "x-misp-object--22395f70-e94a-43fe-a45a-d4e21ebc289f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f4f47f65-ecb5-40bc-b4be-73fa5e06adfc",
"created": "2018-03-13T13:56:26.000Z",
"modified": "2018-03-13T13:56:26.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8d76e8fb-32e8-4b38-a540-8ab6539c1a13",
"target_ref": "x-misp-object--d6a57e30-b781-4431-96c7-a3922f77c64f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--f4361f90-557b-474b-bbed-f3e3e86d0329",
"created": "2018-03-13T13:56:26.000Z",
"modified": "2018-03-13T13:56:26.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--8ddfa5e0-c492-4661-92cd-e927230d5b3d",
"target_ref": "x-misp-object--ea151dbd-2122-4785-9e0b-4adee906b295"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6086697e-0f78-4913-b7ae-2ff94e988339",
"created": "2018-03-13T13:56:27.000Z",
"modified": "2018-03-13T13:56:27.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--848a653a-0ff6-4b48-aa3f-ed315f673c79",
"target_ref": "x-misp-object--44e7f385-7e2c-419d-a1cc-9a62e0cb1be0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--280f7ea6-1e58-4918-a8ba-3a6d8196c7a2",
"created": "2018-03-13T13:56:27.000Z",
"modified": "2018-03-13T13:56:27.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--79a94358-05a4-4a42-80fa-7449e6261551",
"target_ref": "x-misp-object--692fc00c-4eb6-45d1-9772-d705f620d05f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9a237483-0892-4c8c-bd6a-338f2067cbc4",
"created": "2018-03-13T13:56:27.000Z",
"modified": "2018-03-13T13:56:27.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--de1f9e1e-cc20-4d3d-ba3d-ff289e81ea2e",
"target_ref": "x-misp-object--bd207aa7-e09f-470d-81da-8745020f58d5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--571b8662-c00d-469f-a1f0-733a026ab26d",
"created": "2018-03-13T13:56:27.000Z",
"modified": "2018-03-13T13:56:27.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--dafda082-ec7e-46ff-a7c8-41af48f58dbd",
"target_ref": "x-misp-object--79f3e338-4702-4264-aa1c-c03b057e5207"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e10cdfbd-6fbc-4447-99a1-79d728430a4d",
"created": "2018-03-13T13:56:27.000Z",
"modified": "2018-03-13T13:56:27.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--89038c85-d67e-4771-afe8-5a91d9d6edd4",
"target_ref": "x-misp-object--36eac465-9951-41e9-ada5-3b203a4ad794"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a88408de-1342-4951-9e62-6e8c47faa391",
"created": "2018-03-13T13:56:27.000Z",
"modified": "2018-03-13T13:56:27.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--dcca29bf-3545-4c53-8410-5f92da6d4820",
"target_ref": "x-misp-object--8a9d68e7-d771-4af0-a4a6-4fb30dbfea47"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9cc9a005-aaae-424e-aaea-564053496981",
"created": "2018-03-13T13:56:27.000Z",
"modified": "2018-03-13T13:56:27.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--acb977e6-4468-4ac7-b23f-21c5f5636112",
"target_ref": "x-misp-object--4fe83c08-1055-407a-b799-ded69ab4fccb"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--99570dd0-b83a-47fa-adbd-429f13a119a4",
"created": "2018-03-13T13:56:27.000Z",
"modified": "2018-03-13T13:56:27.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--bd503999-5a9e-43ea-bb23-776ad89490bf",
"target_ref": "x-misp-object--a47bd8da-bdbd-4aed-9eef-a11e36096b26"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c373dae7-6bc8-45e1-895c-4f06d9970e08",
"created": "2018-03-13T13:56:27.000Z",
"modified": "2018-03-13T13:56:27.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--00af6957-6e5d-4518-a3ab-78db7b785812",
"target_ref": "x-misp-object--e9de06fa-e36b-43b5-b5da-9da311f24fe0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9949c894-ae41-4d0c-bb5b-d8b4290c54f2",
"created": "2018-03-13T13:56:27.000Z",
"modified": "2018-03-13T13:56:27.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5250e462-e606-43b3-af21-b25d353ca77a",
"target_ref": "x-misp-object--6ae57d88-3897-4d06-aea0-539f68acd4f0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--01781047-fcfe-4f56-9da8-28f238f96246",
"created": "2018-03-13T13:56:28.000Z",
"modified": "2018-03-13T13:56:28.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--4fa3da7c-2e32-4789-aeab-967e4c7043f2",
"target_ref": "x-misp-object--75254811-0801-4316-b27b-df50b7439502"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--feb4b119-3f25-4f75-9dda-4a9be7a486b2",
"created": "2018-03-13T13:56:28.000Z",
"modified": "2018-03-13T13:56:28.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b10a1850-a549-42eb-a281-15589b9804b9",
"target_ref": "x-misp-object--e131e510-e043-4d38-a582-391c654a491e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fa6206e8-c728-4004-8870-a8a1cc024778",
"created": "2018-03-13T13:56:28.000Z",
"modified": "2018-03-13T13:56:28.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f6a62907-ffae-4a96-b58e-a54dc45bdd71",
"target_ref": "x-misp-object--73293f69-441f-4861-8668-9babeecc2ab7"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e1a1fac5-1f5a-4d98-9620-f43e9af41e70",
"created": "2018-03-13T13:56:28.000Z",
"modified": "2018-03-13T13:56:28.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--da8a4dce-3681-4781-9bcf-b6cece8ddcee",
"target_ref": "x-misp-object--f0b4badf-9446-4115-bd57-b2a66f55f470"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0e96cf62-4907-41cb-aabf-3731c6be242e",
"created": "2018-03-13T13:56:28.000Z",
"modified": "2018-03-13T13:56:28.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--dc5355e8-5eab-4718-9235-f1b551b863a2",
"target_ref": "x-misp-object--2d79df26-7862-4e28-acf6-b6b1a331755e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fd0ff24c-8549-4cd1-a486-30261b4c116d",
"created": "2018-03-13T13:56:28.000Z",
"modified": "2018-03-13T13:56:28.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d5911876-ca1d-4b22-8c38-7119fca9fa0e",
"target_ref": "x-misp-object--487e2e6b-c536-4df1-accb-a29b42e96b2c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a8470c28-966e-461c-b5d6-c5e1970200a6",
"created": "2018-03-13T13:56:28.000Z",
"modified": "2018-03-13T13:56:28.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--0e4cac6a-d9b5-4118-bde4-60ad3a609a8f",
"target_ref": "x-misp-object--146e4c31-21b3-46fe-b8de-7f769392972f"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--a849ee4c-ea57-41dc-9ee5-de59f6bc013a",
"created": "2018-03-13T13:56:28.000Z",
"modified": "2018-03-13T13:56:28.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--f0b0d5df-1bae-410a-9926-6a0e64f64ff6",
"target_ref": "x-misp-object--69b924fb-8254-413e-9800-544b82939ba8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--cc4f40c8-b4cd-49d7-9a15-30a8029f1fc0",
"created": "2018-03-13T13:56:28.000Z",
"modified": "2018-03-13T13:56:28.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--26df4a37-ab0a-4532-96d1-f2e7c0109bd1",
"target_ref": "x-misp-object--5e7ba62c-dec2-4434-9031-ecbe140bfe09"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8156b46f-8006-4b3f-9573-a277a643a65b",
"created": "2018-03-13T13:56:28.000Z",
"modified": "2018-03-13T13:56:28.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--077ac4ee-08ca-446e-88e3-c860f15d6e42",
"target_ref": "x-misp-object--19dbb91d-5dc1-4a68-beb7-2855a8b55944"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--33077db2-fde2-4a18-ba7e-0b596c0e6093",
"created": "2018-03-13T13:56:29.000Z",
"modified": "2018-03-13T13:56:29.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--16be79c8-3fcf-49ad-9a56-0c21f71a340a",
"target_ref": "x-misp-object--89a77099-d59d-44d4-8a59-0738bb796d43"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0d82bb92-020b-499a-907e-2c74a9c038c4",
"created": "2018-03-13T13:56:29.000Z",
"modified": "2018-03-13T13:56:29.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9652d6e1-a194-4a6a-929c-e7e956850f89",
"target_ref": "x-misp-object--52a4df42-1337-4088-bf56-b667387402a3"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--acd5295e-0261-4651-9687-a79d72f8e591",
"created": "2018-03-13T13:56:29.000Z",
"modified": "2018-03-13T13:56:29.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d1d8a404-37d2-4f24-9178-8bc2dbe65ccf",
"target_ref": "x-misp-object--97568f59-097d-4e72-b4dc-fd68c408c85a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--9163b719-2c75-4f8f-86f8-ff73c34a59a0",
"created": "2018-03-13T13:56:29.000Z",
"modified": "2018-03-13T13:56:29.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--03e306e0-62ae-4534-912a-59d311bc5ccc",
"target_ref": "x-misp-object--9b39352a-bfd8-4477-ac80-b9092c06bf88"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--86037b0b-ad85-4888-bc40-0c0f8b4e697c",
"created": "2018-03-13T13:56:29.000Z",
"modified": "2018-03-13T13:56:29.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3d85b1c8-be3d-4656-918a-168f4f155069",
"target_ref": "x-misp-object--1c6103ea-83ca-4a82-aeda-c4aa8f13e23c"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--7fb99ba5-e121-44cf-a036-f50dfbdb7837",
"created": "2018-03-13T13:56:29.000Z",
"modified": "2018-03-13T13:56:29.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--04b2a401-b201-464d-810b-88383d077361",
"target_ref": "x-misp-object--aa6b3be5-ea62-429f-8e69-13ae6bed6d86"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--3b567541-7758-470d-81ca-d8d6a5b7ec2e",
"created": "2018-03-13T13:56:29.000Z",
"modified": "2018-03-13T13:56:29.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--882870ac-fcf6-4458-b142-3c80c26ccbe9",
"target_ref": "x-misp-object--87ca3a43-63b2-4b36-bc14-b1d410544873"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--0d2558c8-7c4e-43ad-89d7-7ca2b6c9f1a3",
"created": "2018-03-13T13:56:29.000Z",
"modified": "2018-03-13T13:56:29.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d054c158-41ed-4da9-a47d-6a27d632286f",
"target_ref": "x-misp-object--a3318579-3b87-4794-aa53-dceb5cb0f91d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6fb3e839-fec0-4237-81a0-1b91cdd3dff1",
"created": "2018-03-13T13:56:29.000Z",
"modified": "2018-03-13T13:56:29.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--56f36f82-1ba1-4809-a5e7-90cd21f3aaa0",
"target_ref": "x-misp-object--f5228bc9-0596-44c7-a7d1-fb756784412d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1ebd10b2-1bc7-4c74-a87f-873ed166ecca",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b91e8990-cf2b-407a-8991-bbb3608c6b9e",
"target_ref": "x-misp-object--f83f28b9-063a-446a-8f9c-38f9c269399b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c305167a-399e-4f87-830e-2303ef52b2dc",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e4a9332e-e3d0-46c9-ba7d-ca1c7293848e",
"target_ref": "x-misp-object--320ba851-d81c-484f-894a-701364ece4c0"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fbbfdc2d-d0e2-49bf-91b7-4c13372df827",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b3324698-2b4a-471c-b45b-e2f397b81af6",
"target_ref": "x-misp-object--077cc537-080b-4c47-bf21-7df045b20744"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--34b3980d-6320-444b-9183-de3fe2bcbbc3",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--9fa8595c-97de-41fd-9276-d562acbefb96",
"target_ref": "x-misp-object--dd2d5a11-f02f-400b-9d17-a9e9147288ee"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c2a82ba3-e1d1-4c14-af57-4cacf070820d",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--446c3020-b0e4-492c-bd12-7066f1104d9d",
"target_ref": "x-misp-object--0888e8dc-2d19-41be-b507-e64d24336064"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ece69363-1a5e-4c84-a65a-b439ad3e27a5",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ec43784b-9ba5-4e7f-8dfe-5a027d2a39c2",
"target_ref": "x-misp-object--66b5dbaf-aead-471a-be05-03d7ceecff15"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--76cecc97-eef0-4584-a12a-60936c4c4dcb",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--2a2a5f55-bf30-419d-8aca-626ac8cff579",
"target_ref": "x-misp-object--feeab5d5-1436-4855-9ba9-bfd9f5c956ec"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fa39bb20-3ed2-4c4f-8f42-713d9688dd15",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--5db9b3d7-9465-4c17-96f8-f5ed425224aa",
"target_ref": "x-misp-object--f9c1b826-7799-4c2c-a723-07377a3d1bfd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--ea101768-ddc1-4dfc-8734-d13dd8697dea",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--3be79107-b34a-4c7f-ba2c-fef85b1cee8b",
"target_ref": "x-misp-object--166bda7d-6c12-4ddc-a33f-2d4ef0d3ec3d"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5fdcd87c-060e-4d9b-8041-48b04364c815",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6baeead3-c809-41df-b607-ca5848e68fb1",
"target_ref": "x-misp-object--f491f23c-43cf-4453-87db-3607b86510a4"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e841c6fb-8270-4270-a845-a863c1ff7c16",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--ae8e3d01-4e47-42df-9607-9167544acc06",
"target_ref": "x-misp-object--5062fa66-2e6c-4fe1-8aa7-43cf26de6aad"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--bffe8fc8-fdb4-452e-b05a-9d6a37d444e8",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--7fb8d9ab-db52-4104-8f75-f38f288d8b1e",
"target_ref": "x-misp-object--4ee3557a-7d82-4325-9be5-ce3d1ad60f98"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b77c852e-9ab2-431a-9ed5-7042983e8de7",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--6f20eba9-8ddc-4fd2-8308-09ad81eab0c7",
"target_ref": "x-misp-object--be45c6a2-715c-4c95-9375-97988cb782a5"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--5dbd4e0b-1f4b-4c45-9027-ad2d6c24734c",
"created": "2018-03-13T13:56:30.000Z",
"modified": "2018-03-13T13:56:30.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c8442b78-eb30-4e6b-82f8-c493beab29ad",
"target_ref": "x-misp-object--b15ff2f5-a898-4dbf-92ef-2630c13bcb9f"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}