misp-circl-feed/feeds/circl/stix-2.1/5aec0f0f-7fe0-4e42-8f64-44e5950d210f.json

1748 lines
No EOL
74 KiB
JSON

{
"type": "bundle",
"id": "bundle--5aec0f0f-7fe0-4e42-8f64-44e5950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T13:45:29.000Z",
"modified": "2018-05-04T13:45:29.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5aec0f0f-7fe0-4e42-8f64-44e5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T13:45:29.000Z",
"modified": "2018-05-04T13:45:29.000Z",
"name": "OSINT - Who's who in the zoo. Cyberespionage operation targets android users in the Middle East.",
"published": "2018-05-04T13:45:31Z",
"object_refs": [
"observed-data--5aec0f20-88a8-49fa-80f5-4733950d210f",
"url--5aec0f20-88a8-49fa-80f5-4733950d210f",
"indicator--5aec200b-7a44-4031-8c84-43e4950d210f",
"indicator--5aec200c-c464-4a1f-877d-446f950d210f",
"indicator--5aec200c-31d0-46b1-8b30-485d950d210f",
"indicator--5aec200d-4b3c-44f6-ac45-46ea950d210f",
"indicator--5aec200d-786c-4cf7-b419-46f3950d210f",
"indicator--5aec200d-4b50-4080-9453-4428950d210f",
"indicator--5aec200e-c888-486a-84ac-4da1950d210f",
"x-misp-attribute--5aec2023-ac18-4e5e-a38e-4a21950d210f",
"indicator--5aec21f5-231c-4ea4-9683-481d950d210f",
"indicator--5aec21f5-e3c4-4426-bf33-4d28950d210f",
"indicator--5aec21f6-3204-42b7-8583-482c950d210f",
"indicator--5aec312f-2280-408b-8fb4-48bf950d210f",
"indicator--5aec3170-cf04-4f1a-8b7c-47c8950d210f",
"indicator--5aec3171-a648-4a7b-9da9-4bb8950d210f",
"indicator--5aec4260-e03c-4a10-94e8-74f2950d210f",
"indicator--5aec4261-7c88-40a3-a811-74f2950d210f",
"indicator--5aec4261-23c8-495d-a098-74f2950d210f",
"indicator--5aec4262-262c-4d1b-afdb-74f2950d210f",
"indicator--5aec4262-0fb4-4591-83fa-74f2950d210f",
"indicator--5aec2376-7238-4823-a66f-4098950d210f",
"indicator--5aec253b-b91c-4875-9bbe-46a4950d210f",
"indicator--5aec27dd-65e4-4294-9cf5-4b35950d210f",
"indicator--5aec27fd-501c-40b3-9c57-434b950d210f",
"indicator--5aec280d-da64-4155-96aa-4e71950d210f",
"indicator--5aec2828-6448-49d4-93b7-4ee6950d210f",
"indicator--5aec284f-bab0-4ccc-a5a4-45d8950d210f",
"indicator--5aec2861-cf0c-4a9d-a128-4a65950d210f",
"indicator--5aec2a50-d48c-431d-b9ce-4a73950d210f",
"indicator--5aec2a63-d16c-4fa9-869a-4b93950d210f",
"indicator--5aec2ac7-4a48-4856-af56-42a5950d210f",
"indicator--5aec2ad5-f324-4b6f-bec6-41f7950d210f",
"indicator--5aec2dc4-5bec-4615-954d-4b19950d210f",
"indicator--5aec2dd5-d610-4d7f-9902-438b950d210f",
"indicator--5aec2dea-61c4-47b6-acde-45a6950d210f",
"x-misp-object--5aec413c-f01c-4c19-9761-4a1a950d210f",
"x-misp-object--5aec419c-5240-4635-ab6f-14ac950d210f",
"x-misp-object--5aec41f0-bfb0-40d4-bd05-1703950d210f",
"indicator--5aec4229-9244-4408-b095-4408950d210f",
"indicator--27686eee-e891-46e5-b144-cb0e10e53c8f",
"x-misp-object--35191532-c69c-43b6-837e-36ca962d6e48",
"indicator--30b25aaa-3cb2-4cd1-abf5-08129005f43d",
"x-misp-object--f3617dcc-af62-4280-9c9a-ab9d3d299f03",
"indicator--603ec016-9820-4262-b877-f42d0c72a95c",
"x-misp-object--d6a1412f-41bc-4263-8422-139cc4ec59a8",
"indicator--1f4deeda-c969-4626-8eae-d5f557f2937a",
"x-misp-object--dd172fdf-c047-47b9-bc67-8cae925cf527",
"indicator--042c8757-07c8-4c84-8b0c-300b1d946d41",
"x-misp-object--66ec9834-1856-4819-81d0-a7a19e5f8eea",
"indicator--c6337b0c-b9a1-4c12-92e5-3223c4abd133",
"x-misp-object--a4c9366f-a617-4a9e-bd17-da10b804814b",
"indicator--a57227d9-7325-46f3-ace1-e19ca49e51ec",
"x-misp-object--07699f23-1898-4fd7-86d3-29fa7c088378",
"indicator--d0ecc2c5-6e10-4077-ac69-28ed3a6a374f",
"x-misp-object--70ca0203-d569-42dd-8538-112a5385c7bd",
"indicator--29f9cb3b-24a0-48f9-b03b-55160ffa3040",
"x-misp-object--36852ace-b32b-49ce-b563-4c1d366459d8",
"relationship--878e9d91-9f2a-4228-800b-db488889d344",
"relationship--fc0c5272-b1d7-4772-9e7e-583977b5d9d0",
"relationship--150eee68-7d22-440a-ba46-0fb0eda74e23",
"relationship--d6759d15-a2f6-4e27-a2a6-2b2bc24243f0",
"relationship--1dfb0f72-b1ed-4e8f-a716-dea124f29b76",
"relationship--405857ba-2184-44ae-aef4-9c5385743dfc",
"relationship--4cdea0f6-9c9d-4af7-9121-38240080fa5b",
"relationship--37a4550c-65a4-421f-88bb-606ca466e0bf",
"relationship--c162b294-94fe-4602-b9f8-305b7eaf8915"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"misp-galaxy:threat-actor=\"ZooPark\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5aec0f20-88a8-49fa-80f5-4733950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:12.000Z",
"modified": "2018-05-04T11:39:12.000Z",
"first_observed": "2018-05-04T11:39:12Z",
"last_observed": "2018-05-04T11:39:12Z",
"number_observed": 1,
"object_refs": [
"url--5aec0f20-88a8-49fa-80f5-4733950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5aec0f20-88a8-49fa-80f5-4733950d210f",
"value": "https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/05/03095519/ZooPark_for_public_final.pdf"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec200b-7a44-4031-8c84-43e4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:13.000Z",
"modified": "2018-05-04T11:39:13.000Z",
"description": "C2 server",
"pattern": "[domain-name:value = 'entekhab10.xp3.biz']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"hostname\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec200c-c464-4a1f-877d-446f950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T08:55:40.000Z",
"modified": "2018-05-04T08:55:40.000Z",
"description": "C2 server",
"pattern": "[domain-name:value = 'androidupdaters.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T08:55:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec200c-31d0-46b1-8b30-485d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T08:55:40.000Z",
"modified": "2018-05-04T08:55:40.000Z",
"description": "C2 server",
"pattern": "[domain-name:value = 'dlgmail.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T08:55:40Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec200d-4b3c-44f6-ac45-46ea950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T08:55:41.000Z",
"modified": "2018-05-04T08:55:41.000Z",
"description": "C2 server",
"pattern": "[domain-name:value = 'rhubarb2.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T08:55:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec200d-786c-4cf7-b419-46f3950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T08:55:41.000Z",
"modified": "2018-05-04T08:55:41.000Z",
"description": "C2 server",
"pattern": "[domain-name:value = 'rhubarb3.com']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T08:55:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec200d-4b50-4080-9453-4428950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:13.000Z",
"modified": "2018-05-04T11:39:13.000Z",
"description": "C2 server",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.61.27.154']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec200e-c888-486a-84ac-4da1950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:14.000Z",
"modified": "2018-05-04T11:39:14.000Z",
"description": "C2 server",
"pattern": "[network-traffic:dst_ref.type = 'ipv4-addr' AND network-traffic:dst_ref.value = '5.61.27.157']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"ip-dst\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5aec2023-ac18-4e5e-a38e-4a21950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:14.000Z",
"modified": "2018-05-04T11:39:14.000Z",
"labels": [
"misp:type=\"comment\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "comment",
"x_misp_value": "ZooPark is a cyberespionage operation that has been focusing on Middle Eastern targets since at least June 2015. The threat actors behind ZooPark infect Android devices using several generations of malware we label from v1-v4, with v4 being the most recent version deployed in 2017.\r\n\r\nThe preferred infection vector for ZooPark is waterhole attacks. We found several news websites that have been hacked by the attackers to redirect visitors to a downloading site that serves malicious APKs. Some of the themes observed in campaign include \u00e2\u20ac\u0153Kurdistan referendum\u00e2\u20ac\u009d, \u00e2\u20ac\u0153TelegramGroups\u00e2\u20ac\u009d and \u00e2\u20ac\u0153Alnaharegypt news\u00e2\u20ac\u009d, among others. \r\n\r\nTarget profile has evolved during the last years of campaign, focusing on victims in Egypt, Jordan, Morocco and Lebanon."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec21f5-231c-4ea4-9683-481d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:14.000Z",
"modified": "2018-05-04T11:39:14.000Z",
"description": "Watering holes",
"pattern": "[url:value = 'http://www.alnaharegypt.com/t~467369']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec21f5-e3c4-4426-bf33-4d28950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:15.000Z",
"modified": "2018-05-04T11:39:15.000Z",
"description": "Watering holes",
"pattern": "[url:value = 'http://showroommontorgueil.com/modules/homepageadvertise2/slides/alnaharegypt.news_v2.0.apk']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec21f6-3204-42b7-8583-482c950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:15.000Z",
"modified": "2018-05-04T11:39:15.000Z",
"description": "Watering holes",
"pattern": "[url:value = 'http://www.alhayatnews.com/ArabicRSS.apk']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:15Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec312f-2280-408b-8fb4-48bf950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:16.000Z",
"modified": "2018-05-04T11:39:16.000Z",
"pattern": "[url:value = 'http://www.rhubarb2.com/telg/sv/sv.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec3170-cf04-4f1a-8b7c-47c8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:16.000Z",
"modified": "2018-05-04T11:39:16.000Z",
"pattern": "[url:value = 'http://www.rhubarb2.com/get/index.php?id=']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec3171-a648-4a7b-9da9-4bb8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:17.000Z",
"modified": "2018-05-04T11:39:17.000Z",
"pattern": "[url:value = 'http://www.rhubarb2.com/telg/index.php?set=show']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:17Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec4260-e03c-4a10-94e8-74f2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:18.000Z",
"modified": "2018-05-04T11:39:18.000Z",
"pattern": "[url:value = 'http://www.rhubarb3.com/get/index.php?id=']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec4261-7c88-40a3-a811-74f2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:18.000Z",
"modified": "2018-05-04T11:39:18.000Z",
"pattern": "[url:value = 'androidupdaters.com/img.jpg']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:18Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec4261-23c8-495d-a098-74f2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:19.000Z",
"modified": "2018-05-04T11:39:19.000Z",
"pattern": "[url:value = 'rhubarb3.com/telg/sv/sv.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec4262-262c-4d1b-afdb-74f2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:19.000Z",
"modified": "2018-05-04T11:39:19.000Z",
"pattern": "[url:value = 'rhubarb3.com/telg/index.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec4262-0fb4-4591-83fa-74f2950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:19.000Z",
"modified": "2018-05-04T11:39:19.000Z",
"pattern": "[url:value = 'rhubarb3.com/get/index.php']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:19Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec2376-7238-4823-a66f-4098950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:10:14.000Z",
"modified": "2018-05-04T09:10:14.000Z",
"description": "Version 1.0",
"pattern": "[file:hashes.MD5 = '232bd3dde6914db0a3dbfc21ed178887' AND file:name = 'Entekhab10 V1.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:10:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec253b-b91c-4875-9bbe-46a4950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:17:47.000Z",
"modified": "2018-05-04T09:17:47.000Z",
"description": "Version 1.0",
"pattern": "[file:hashes.MD5 = '5efddd7f0fc2125e78a2ca18b68464ec' AND file:name = 'Entekhab10-v3.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:17:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec27dd-65e4-4294-9cf5-4b35950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:29:01.000Z",
"modified": "2018-05-04T09:29:01.000Z",
"description": "Version 1.0",
"pattern": "[file:hashes.MD5 = 'ec5a6f0e743f4b858aba9de96a33fb0c' AND file:name = 'TelegramGroups.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:29:01Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec27fd-501c-40b3-9c57-434b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:29:33.000Z",
"modified": "2018-05-04T09:29:33.000Z",
"description": "Version 2.0",
"pattern": "[file:hashes.MD5 = '6a388edbce88bb0331ae875ceeb2f319' AND file:name = 'AllInOne.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:29:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec280d-da64-4155-96aa-4e71950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:29:49.000Z",
"modified": "2018-05-04T09:29:49.000Z",
"description": "Version 2.0",
"pattern": "[file:hashes.MD5 = 'e2f62b5acf3795a62e9d54e1301c4e7b' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:29:49Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec2828-6448-49d4-93b7-4ee6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:30:16.000Z",
"modified": "2018-05-04T09:30:16.000Z",
"description": "Version 2.0",
"pattern": "[file:hashes.MD5 = 'cb67abd070ae188390fc040cbe60e677' AND file:name = 'Referendum Kurdistan.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:30:16Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec284f-bab0-4ccc-a5a4-45d8950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:30:55.000Z",
"modified": "2018-05-04T09:30:55.000Z",
"description": "Version 2.0",
"pattern": "[file:hashes.MD5 = 'cb67abd070ae188390fc040cbe60e677' AND file:name = 'Referendum Kurdistan.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:30:55Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec2861-cf0c-4a9d-a128-4a65950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:31:13.000Z",
"modified": "2018-05-04T09:31:13.000Z",
"description": "Version 2.0",
"pattern": "[file:hashes.MD5 = '699a7eedd244f402303bcffdee1f0ed1' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:31:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec2a50-d48c-431d-b9ce-4a73950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:39:28.000Z",
"modified": "2018-05-04T09:39:28.000Z",
"description": "Version 3.0",
"pattern": "[file:hashes.MD5 = '7d7ad116e6a42d4e518378e2313e9392' AND file:name = 'Sexy_wallpaper.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:39:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec2a63-d16c-4fa9-869a-4b93950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:39:47.000Z",
"modified": "2018-05-04T09:39:47.000Z",
"description": "Version 3.0",
"pattern": "[file:hashes.MD5 = 'a7d00c8629079f944b61c4dd5c77c8fb' AND file:name = 'ArabicRSS.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:39:47Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec2ac7-4a48-4856-af56-42a5950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:41:27.000Z",
"modified": "2018-05-04T09:41:27.000Z",
"description": "Version 3.0",
"pattern": "[file:hashes.MD5 = 'b714b092d2f28fcf78ef8d02b46dbf9c' AND file:name = 'Alnaharegypt.news_v2.0.apk' AND file:name = 'familyinnovation_app.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:41:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec2ad5-f324-4b6f-bec6-41f7950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:41:41.000Z",
"modified": "2018-05-04T09:41:41.000Z",
"description": "Version 3.0",
"pattern": "[file:hashes.MD5 = 'ac4402e04de0949d7beed975db84e594' AND file:name = 'com.ann.newspaper.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:41:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec2dc4-5bec-4615-954d-4b19950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:54:12.000Z",
"modified": "2018-05-04T09:54:12.000Z",
"description": "Version 4.0",
"pattern": "[file:hashes.MD5 = '519018ecfc50c0cf6cd0c88cc41b2a69' AND file:name = 'FirewallFA.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:54:12Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec2dd5-d610-4d7f-9902-438b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:54:29.000Z",
"modified": "2018-05-04T09:54:29.000Z",
"description": "Version 4.0",
"pattern": "[file:hashes.MD5 = '5ad36f6dd060e52771a8e4a1dd90c50c' AND file:name = 'DVPNEasy.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:54:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec2dea-61c4-47b6-acde-45a6950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T09:54:50.000Z",
"modified": "2018-05-04T09:54:50.000Z",
"description": "Version 4.0",
"pattern": "[file:hashes.MD5 = 'b44b91b14f176fbf93d998141931a4aa' AND file:name = 'DeleteTelegram.apk' AND file:x_misp_state = 'Malicious']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T09:54:50Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5aec413c-f01c-4c19-9761-4a1a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:17:16.000Z",
"modified": "2018-05-04T11:17:16.000Z",
"labels": [
"misp:name=\"whois\"",
"misp:meta-category=\"network\""
],
"x_misp_attributes": [
{
"type": "whois-registrant-email",
"object_relation": "registrant-email",
"value": "asgharkhof@gmail.com",
"category": "Attribution",
"uuid": "5aec413c-96e0-42d7-9cef-4504950d210f"
},
{
"type": "domain",
"object_relation": "domain",
"value": "androidupdaters.com",
"category": "Network activity",
"to_ids": true,
"uuid": "5aec413c-73e4-48a7-9eb5-4d1c950d210f"
},
{
"type": "ip-src",
"object_relation": "ip-address",
"value": "178.162.214.146",
"category": "Network activity",
"to_ids": true,
"uuid": "5aec413d-12e0-454d-9188-4856950d210f"
},
{
"type": "whois-registrant-name",
"object_relation": "registrant-name",
"value": "parspack 62555",
"category": "Attribution",
"uuid": "5aec413d-767c-40ef-9001-46d7950d210f"
},
{
"type": "whois-registrant-phone",
"object_relation": "registrant-phone",
"value": "+982188561212",
"category": "Attribution",
"uuid": "5aec413e-c298-44cd-8ffc-4a8c950d210f"
}
],
"x_misp_meta_category": "network",
"x_misp_name": "whois"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5aec419c-5240-4635-ab6f-14ac950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:18:52.000Z",
"modified": "2018-05-04T11:18:52.000Z",
"labels": [
"misp:name=\"whois\"",
"misp:meta-category=\"network\""
],
"x_misp_attributes": [
{
"type": "whois-registrant-email",
"object_relation": "registrant-email",
"value": "silent.city2020@mail.com",
"category": "Attribution",
"uuid": "5aec419d-4218-46d5-82bc-14ac950d210f"
},
{
"type": "domain",
"object_relation": "domain",
"value": "dlgmail.com",
"category": "Network activity",
"to_ids": true,
"uuid": "5aec419d-80cc-4668-9cc2-14ac950d210f"
},
{
"type": "ip-src",
"object_relation": "ip-address",
"value": "46.4.41.195",
"category": "Network activity",
"to_ids": true,
"uuid": "5aec419e-04e8-4822-b841-14ac950d210f"
},
{
"type": "whois-registrant-name",
"object_relation": "registrant-name",
"value": "mohammad hosein asna ashar",
"category": "Attribution",
"uuid": "5aec419e-8508-45dc-a7b1-14ac950d210f"
},
{
"type": "whois-registrant-phone",
"object_relation": "registrant-phone",
"value": "+982188888299",
"category": "Attribution",
"uuid": "5aec419f-0dc0-41a8-ab47-14ac950d210f"
}
],
"x_misp_meta_category": "network",
"x_misp_name": "whois"
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5aec41f0-bfb0-40d4-bd05-1703950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:20:16.000Z",
"modified": "2018-05-04T11:20:16.000Z",
"labels": [
"misp:name=\"whois\"",
"misp:meta-category=\"network\""
],
"x_misp_attributes": [
{
"type": "whois-registrant-email",
"object_relation": "registrant-email",
"value": "pilton86@yahoo.com",
"category": "Attribution",
"uuid": "5aec41f0-0070-4f0e-a930-1703950d210f"
},
{
"type": "domain",
"object_relation": "domain",
"value": "rhubarb2.com",
"category": "Network activity",
"to_ids": true,
"uuid": "5aec41f1-424c-472e-a5a9-1703950d210f"
},
{
"type": "ip-src",
"object_relation": "ip-address",
"value": "109.200.28.162",
"category": "Network activity",
"to_ids": true,
"uuid": "5aec41f1-3e28-4e7c-b5fe-1703950d210f"
},
{
"type": "whois-registrant-name",
"object_relation": "registrant-name",
"value": "Mohsen Malekian",
"category": "Attribution",
"uuid": "5aec41f2-5424-4f0e-bf2b-1703950d210f"
},
{
"type": "whois-registrant-phone",
"object_relation": "registrant-phone",
"value": "+989303938251",
"category": "Attribution",
"uuid": "5aec41f2-1678-4088-9251-1703950d210f"
}
],
"x_misp_meta_category": "network",
"x_misp_name": "whois"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5aec4229-9244-4408-b095-4408950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:21:13.000Z",
"modified": "2018-05-04T11:21:13.000Z",
"pattern": "[domain-name:value = 'rhubarb3.com' AND domain-name:resolves_to_refs[*].value = '5.144.130.33' AND domain-name:resolves_to_refs[*].value = '46.4.74.56']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:21:13Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "network"
}
],
"labels": [
"misp:name=\"domain-ip\"",
"misp:meta-category=\"network\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--27686eee-e891-46e5-b144-cb0e10e53c8f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:23.000Z",
"modified": "2018-05-04T11:39:23.000Z",
"pattern": "[file:hashes.MD5 = '7d7ad116e6a42d4e518378e2313e9392' AND file:hashes.SHA1 = '237ccbbe5641bc2cb7283757d91d65bc641d6a26' AND file:hashes.SHA256 = 'f7fe4e299599a60a4797f9a13468e366394dc2d86ab768f681a0876d8ff052e0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--35191532-c69c-43b6-837e-36ca962d6e48",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:21.000Z",
"modified": "2018-05-04T11:39:21.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-05-03T13:06:24",
"category": "Other",
"uuid": "5aec4669-e710-4033-b4f7-753902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "32/62",
"category": "Other",
"uuid": "5aec466a-b1dc-40ab-b171-753902de0b81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/f7fe4e299599a60a4797f9a13468e366394dc2d86ab768f681a0876d8ff052e0/analysis/1525352784/",
"category": "External analysis",
"uuid": "5aec466a-3240-4c5d-8fff-753902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--30b25aaa-3cb2-4cd1-abf5-08129005f43d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:25.000Z",
"modified": "2018-05-04T11:39:25.000Z",
"pattern": "[file:hashes.MD5 = 'ac4402e04de0949d7beed975db84e594' AND file:hashes.SHA1 = 'd4e379313afdd60da889ba6516c754d7018802a1' AND file:hashes.SHA256 = '91659d5f35a8fea1c98f3ea32bcdd71a222f11095de680eb635ec8210fb5dc04']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:25Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--f3617dcc-af62-4280-9c9a-ab9d3d299f03",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:24.000Z",
"modified": "2018-05-04T11:39:24.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-05-03T13:05:58",
"category": "Other",
"uuid": "5aec466c-5b68-4eb8-917a-753902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/61",
"category": "Other",
"uuid": "5aec466c-8730-48e8-aa3d-753902de0b81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/91659d5f35a8fea1c98f3ea32bcdd71a222f11095de680eb635ec8210fb5dc04/analysis/1525352758/",
"category": "External analysis",
"uuid": "5aec466c-7560-4eef-8a29-753902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--603ec016-9820-4262-b877-f42d0c72a95c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:28.000Z",
"modified": "2018-05-04T11:39:28.000Z",
"pattern": "[file:hashes.MD5 = '6a388edbce88bb0331ae875ceeb2f319' AND file:hashes.SHA1 = 'a3e88929cc9347708caf88b371e8555a0b40bbae' AND file:hashes.SHA256 = '041b4d2280cae9720a62350de4541172933909380bb02701a7d20f87e670bac4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:28Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d6a1412f-41bc-4263-8422-139cc4ec59a8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:26.000Z",
"modified": "2018-05-04T11:39:26.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-05-03T13:06:17",
"category": "Other",
"uuid": "5aec466f-5368-47e6-a785-753902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "5/62",
"category": "Other",
"uuid": "5aec466f-c880-422c-ae4b-753902de0b81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/041b4d2280cae9720a62350de4541172933909380bb02701a7d20f87e670bac4/analysis/1525352777/",
"category": "External analysis",
"uuid": "5aec466f-a100-4c3c-847e-753902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--1f4deeda-c969-4626-8eae-d5f557f2937a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:30.000Z",
"modified": "2018-05-04T11:39:30.000Z",
"pattern": "[file:hashes.MD5 = 'cb67abd070ae188390fc040cbe60e677' AND file:hashes.SHA1 = 'c9fb4cd14d88fc7ea6212f213e1f07f5a781edba' AND file:hashes.SHA256 = 'd7da061b55d24a54988a3fca60009da907d14c2bcd32f2e53ef13bd8085b96cc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:30Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--dd172fdf-c047-47b9-bc67-8cae925cf527",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:29.000Z",
"modified": "2018-05-04T11:39:29.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-05-03T13:06:30",
"category": "Other",
"uuid": "5aec4671-c914-422f-8d45-753902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "11/62",
"category": "Other",
"uuid": "5aec4672-3614-4500-af7b-753902de0b81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/d7da061b55d24a54988a3fca60009da907d14c2bcd32f2e53ef13bd8085b96cc/analysis/1525352790/",
"category": "External analysis",
"uuid": "5aec4672-056c-42a9-94e1-753902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--042c8757-07c8-4c84-8b0c-300b1d946d41",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:33.000Z",
"modified": "2018-05-04T11:39:33.000Z",
"pattern": "[file:hashes.MD5 = '699a7eedd244f402303bcffdee1f0ed1' AND file:hashes.SHA1 = '09b2108e72f0b9e0b382a43ead5c0a0e16cb50fa' AND file:hashes.SHA256 = '7a7eee78dfffa5974a2da9bdd3337fb16e5e1d658cbe5284ef352114ef446f6a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:33Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--66ec9834-1856-4819-81d0-a7a19e5f8eea",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:32.000Z",
"modified": "2018-05-04T11:39:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-05-03T13:06:03",
"category": "Other",
"uuid": "5aec4674-045c-48ca-aec0-753902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "17/63",
"category": "Other",
"uuid": "5aec4674-2c68-429c-a76d-753902de0b81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7a7eee78dfffa5974a2da9bdd3337fb16e5e1d658cbe5284ef352114ef446f6a/analysis/1525352763/",
"category": "External analysis",
"uuid": "5aec4674-6cc0-4564-963b-753902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--c6337b0c-b9a1-4c12-92e5-3223c4abd133",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:36.000Z",
"modified": "2018-05-04T11:39:36.000Z",
"pattern": "[file:hashes.MD5 = 'b714b092d2f28fcf78ef8d02b46dbf9c' AND file:hashes.SHA1 = '5a0d2064f7de0c98e91cabaeca2b7f5aa6da70f5' AND file:hashes.SHA256 = '24ee4589a7ed9c7fc630ecbb79d4114ab7ae8ae36b31da42e3fcfbb9edaafdc6']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:36Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--a4c9366f-a617-4a9e-bd17-da10b804814b",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:34.000Z",
"modified": "2018-05-04T11:39:34.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-05-03T13:06:47",
"category": "Other",
"uuid": "5aec4677-e27c-4427-a864-753902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/60",
"category": "Other",
"uuid": "5aec4677-4d90-4f08-9843-753902de0b81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/24ee4589a7ed9c7fc630ecbb79d4114ab7ae8ae36b31da42e3fcfbb9edaafdc6/analysis/1525352807/",
"category": "External analysis",
"uuid": "5aec4677-0f6c-47b1-b347-753902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a57227d9-7325-46f3-ace1-e19ca49e51ec",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:38.000Z",
"modified": "2018-05-04T11:39:38.000Z",
"pattern": "[file:hashes.MD5 = 'e2f62b5acf3795a62e9d54e1301c4e7b' AND file:hashes.SHA1 = '163cb08bd60eb61b71a7c4f1891d1269b1954e6c' AND file:hashes.SHA256 = '59ece87dfa254ba8d47503e069e5e2cb99e22140e9a2e6e56d382a6427171889']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:38Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--07699f23-1898-4fd7-86d3-29fa7c088378",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:37.000Z",
"modified": "2018-05-04T11:39:37.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-05-03T13:06:10",
"category": "Other",
"uuid": "5aec4679-3a48-4bbc-b5b3-753902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "17/60",
"category": "Other",
"uuid": "5aec4679-97e0-4927-9f54-753902de0b81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/59ece87dfa254ba8d47503e069e5e2cb99e22140e9a2e6e56d382a6427171889/analysis/1525352770/",
"category": "External analysis",
"uuid": "5aec4679-f774-4d70-87bc-753902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d0ecc2c5-6e10-4077-ac69-28ed3a6a374f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:41.000Z",
"modified": "2018-05-04T11:39:41.000Z",
"pattern": "[file:hashes.MD5 = 'ec5a6f0e743f4b858aba9de96a33fb0c' AND file:hashes.SHA1 = '06fb916999081a9496715eaf72a77452a11ab09c' AND file:hashes.SHA256 = '76fa36d35e0e16b0ea416726b0da2a66dfe7d7b35504cf6c475eac4cfa95fe3a']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:41Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--70ca0203-d569-42dd-8538-112a5385c7bd",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:39.000Z",
"modified": "2018-05-04T11:39:39.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-05-04T08:50:01",
"category": "Other",
"uuid": "5aec467b-cc64-4270-ab55-753902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "9/61",
"category": "Other",
"uuid": "5aec467b-e32c-4658-8ada-753902de0b81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/76fa36d35e0e16b0ea416726b0da2a66dfe7d7b35504cf6c475eac4cfa95fe3a/analysis/1525423801/",
"category": "External analysis",
"uuid": "5aec467b-e7fc-4d73-a04c-753902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--29f9cb3b-24a0-48f9-b03b-55160ffa3040",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:43.000Z",
"modified": "2018-05-04T11:39:43.000Z",
"pattern": "[file:hashes.MD5 = '5efddd7f0fc2125e78a2ca18b68464ec' AND file:hashes.SHA1 = '82a5907e3be0cac185913f143e2e77c6e8578e7d' AND file:hashes.SHA256 = '0601fc10951b780efb7da41b25f1e41fdb347374e81858cc894e8d8fd2106b7b']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-05-04T11:39:43Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--36852ace-b32b-49ce-b563-4c1d366459d8",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-05-04T11:39:41.000Z",
"modified": "2018-05-04T11:39:41.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-05-03T21:28:50",
"category": "Other",
"uuid": "5aec467d-ed5c-441c-8497-753902de0b81"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "10/62",
"category": "Other",
"uuid": "5aec467e-0adc-4e9c-ad61-753902de0b81"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/0601fc10951b780efb7da41b25f1e41fdb347374e81858cc894e8d8fd2106b7b/analysis/1525382930/",
"category": "External analysis",
"uuid": "5aec467e-d5a8-4a15-ad0b-753902de0b81"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--878e9d91-9f2a-4228-800b-db488889d344",
"created": "2018-05-04T11:39:42.000Z",
"modified": "2018-05-04T11:39:42.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--27686eee-e891-46e5-b144-cb0e10e53c8f",
"target_ref": "x-misp-object--35191532-c69c-43b6-837e-36ca962d6e48"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--fc0c5272-b1d7-4772-9e7e-583977b5d9d0",
"created": "2018-05-04T11:39:43.000Z",
"modified": "2018-05-04T11:39:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--30b25aaa-3cb2-4cd1-abf5-08129005f43d",
"target_ref": "x-misp-object--f3617dcc-af62-4280-9c9a-ab9d3d299f03"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--150eee68-7d22-440a-ba46-0fb0eda74e23",
"created": "2018-05-04T11:39:43.000Z",
"modified": "2018-05-04T11:39:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--603ec016-9820-4262-b877-f42d0c72a95c",
"target_ref": "x-misp-object--d6a1412f-41bc-4263-8422-139cc4ec59a8"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--d6759d15-a2f6-4e27-a2a6-2b2bc24243f0",
"created": "2018-05-04T11:39:43.000Z",
"modified": "2018-05-04T11:39:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--1f4deeda-c969-4626-8eae-d5f557f2937a",
"target_ref": "x-misp-object--dd172fdf-c047-47b9-bc67-8cae925cf527"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--1dfb0f72-b1ed-4e8f-a716-dea124f29b76",
"created": "2018-05-04T11:39:43.000Z",
"modified": "2018-05-04T11:39:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--042c8757-07c8-4c84-8b0c-300b1d946d41",
"target_ref": "x-misp-object--66ec9834-1856-4819-81d0-a7a19e5f8eea"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--405857ba-2184-44ae-aef4-9c5385743dfc",
"created": "2018-05-04T11:39:43.000Z",
"modified": "2018-05-04T11:39:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--c6337b0c-b9a1-4c12-92e5-3223c4abd133",
"target_ref": "x-misp-object--a4c9366f-a617-4a9e-bd17-da10b804814b"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--4cdea0f6-9c9d-4af7-9121-38240080fa5b",
"created": "2018-05-04T11:39:43.000Z",
"modified": "2018-05-04T11:39:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--a57227d9-7325-46f3-ace1-e19ca49e51ec",
"target_ref": "x-misp-object--07699f23-1898-4fd7-86d3-29fa7c088378"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--37a4550c-65a4-421f-88bb-606ca466e0bf",
"created": "2018-05-04T11:39:43.000Z",
"modified": "2018-05-04T11:39:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d0ecc2c5-6e10-4077-ac69-28ed3a6a374f",
"target_ref": "x-misp-object--70ca0203-d569-42dd-8538-112a5385c7bd"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--c162b294-94fe-4602-b9f8-305b7eaf8915",
"created": "2018-05-04T11:39:43.000Z",
"modified": "2018-05-04T11:39:43.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--29f9cb3b-24a0-48f9-b03b-55160ffa3040",
"target_ref": "x-misp-object--36852ace-b32b-49ce-b563-4c1d366459d8"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}