misp-circl-feed/feeds/circl/stix-2.1/5b9f39b4-f618-494f-ad3e-030d950d210f.json

888 lines
No EOL
38 KiB
JSON

{
"type": "bundle",
"id": "bundle--5b9f39b4-f618-494f-ad3e-030d950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:27:38.000Z",
"modified": "2018-09-17T05:27:38.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--5b9f39b4-f618-494f-ad3e-030d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:27:38.000Z",
"modified": "2018-09-17T05:27:38.000Z",
"name": "OSINT - Dangerous Invoices and Dangerous Infrastructure",
"published": "2018-09-17T05:27:53Z",
"object_refs": [
"observed-data--5b9f39c0-4670-40cd-9d22-030d950d210f",
"url--5b9f39c0-4670-40cd-9d22-030d950d210f",
"x-misp-attribute--5b9f39da-599c-4f46-aefe-38dd950d210f",
"indicator--5b9f3a36-188c-4de2-93a8-38dd950d210f",
"indicator--5b9f3a37-eea0-4d2c-8bff-38dd950d210f",
"indicator--5b9f3a38-2828-40bf-83ee-38dd950d210f",
"indicator--5b9f3a38-6d14-4c06-89a9-38dd950d210f",
"indicator--5b9f3a39-c504-4bc1-98c4-38dd950d210f",
"indicator--5b9f3a39-644c-487a-b7a8-38dd950d210f",
"indicator--5b9f3a3a-a7f4-4390-9f37-38dd950d210f",
"indicator--5b9f3a3a-d1bc-47fa-9b90-38dd950d210f",
"indicator--5b9f3a6e-bfec-4d60-861c-4719950d210f",
"observed-data--5b9f3a82-435c-4cdd-9fd3-4685950d210f",
"network-traffic--5b9f3a82-435c-4cdd-9fd3-4685950d210f",
"ipv4-addr--5b9f3a82-435c-4cdd-9fd3-4685950d210f",
"indicator--5b9f3aa6-a274-4e40-b424-030e950d210f",
"indicator--5b9f3ac3-3b24-4b5d-81d9-389a950d210f",
"indicator--5b9f3ac4-a598-44eb-a781-389a950d210f",
"indicator--5b9f3ae0-18c8-4bc4-add5-389a950d210f",
"indicator--89ea32c5-8ed1-4a5d-b6eb-81b304692175",
"x-misp-object--d61a6111-686f-48d9-aa71-670e4ad3af92",
"indicator--41249430-fd98-43d4-8b38-f483450a56e4",
"x-misp-object--600366d9-9b77-418e-afcb-d68d3e6c4f5a",
"indicator--04e56925-da33-4e08-b9a0-9779b75b573d",
"x-misp-object--4d83c4be-5177-4d47-93b9-b31795bbe3af",
"indicator--b74ed736-91e3-4f21-a403-56d5e9b898e6",
"x-misp-object--5b126f66-2005-4273-b502-1ece9c0c273e",
"indicator--e377a0f7-f82e-4ee3-90d0-8404af82b73a",
"x-misp-object--2301b7c2-06a6-4778-a34f-919a1896a278",
"indicator--d32dd9f0-12c0-44c0-8e3e-4cf0bc236a2c",
"x-misp-object--260c7a64-d633-49a2-84de-1dcdabaf419c",
"relationship--b46d34c3-3436-44c0-9748-29de055d7ee8",
"relationship--30fd1243-640c-449a-a8f3-c9af64ae0b9f",
"relationship--6673d173-d99b-49e3-bb88-389c4fa098b9",
"relationship--92e90c02-7930-49a6-a165-c4ae41bb7c5b",
"relationship--8302089c-1dbf-412d-ab67-f38ec442c1f1",
"relationship--e1d794b1-1714-4370-be04-226021fc9727"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"osint:source-type=\"blog-post\"",
"estimative-language:confidence-in-analytic-judgment=\"moderate\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5b9f39c0-4670-40cd-9d22-030d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:21:04.000Z",
"modified": "2018-09-17T05:21:04.000Z",
"first_observed": "2018-09-17T05:21:04Z",
"last_observed": "2018-09-17T05:21:04Z",
"number_observed": 1,
"object_refs": [
"url--5b9f39c0-4670-40cd-9d22-030d950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--5b9f39c0-4670-40cd-9d22-030d950d210f",
"value": "https://garwarner.blogspot.com/2018/09/dangerous-invoices-and-dangerous.html"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--5b9f39da-599c-4f46-aefe-38dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:21:30.000Z",
"modified": "2018-09-17T05:21:30.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "My friends at Cofense published their finding last week that Microsoft Office macros are still the number one way that malware is being delivered via email, accounting for 45% of all malware delivery mechanisms they have recently studied. Anyone with a spam collection can quickly reach that same conclusion. A couple such campaigns even showed up in my personal email this week."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3a36-188c-4de2-93a8-38dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:23:02.000Z",
"modified": "2018-09-17T05:23:02.000Z",
"description": "Invoice.exe",
"pattern": "[file:hashes.MD5 = '1261b8382cfa2b905f0f52a3aef49ce4']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:23:02Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3a37-eea0-4d2c-8bff-38dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:23:03.000Z",
"modified": "2018-09-17T05:23:03.000Z",
"description": "Invoice.exe",
"pattern": "[file:hashes.SHA1 = 'e80c07f700cf817a1eca1f8186f820492f8a2fbc']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:23:03Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3a38-2828-40bf-83ee-38dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:23:04.000Z",
"modified": "2018-09-17T05:23:04.000Z",
"description": "Order.exe",
"pattern": "[file:hashes.MD5 = '57b430ea422d1f33fef19f02fb85c7f0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:23:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3a38-6d14-4c06-89a9-38dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:23:04.000Z",
"modified": "2018-09-17T05:23:04.000Z",
"description": "Order.exe",
"pattern": "[file:hashes.SHA1 = '60a64400207fd9835899189aa0c3cbca027fe8cf']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:23:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3a39-c504-4bc1-98c4-38dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:23:05.000Z",
"modified": "2018-09-17T05:23:05.000Z",
"description": "xox.exe",
"pattern": "[file:hashes.MD5 = '0fa8876252c632b64afad8fd7fa6344f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:23:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3a39-644c-487a-b7a8-38dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:23:05.000Z",
"modified": "2018-09-17T05:23:05.000Z",
"description": "xox.exe",
"pattern": "[file:hashes.SHA1 = 'ab372d169743758bb81abaa4bc303d5303f6d913']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:23:05Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3a3a-a7f4-4390-9f37-38dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:23:06.000Z",
"modified": "2018-09-17T05:23:06.000Z",
"description": "ogo.exe",
"pattern": "[file:hashes.MD5 = 'f321b38b171a3cbc1eff4a41ac5bbe47']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:23:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3a3a-d1bc-47fa-9b90-38dd950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:23:06.000Z",
"modified": "2018-09-17T05:23:06.000Z",
"description": "ogo.exe",
"pattern": "[file:hashes.SHA1 = 'da61f88e2e95a23e58d96cf845c523fd10023cb7']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:23:06Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3a6e-bfec-4d60-861c-4719950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:23:58.000Z",
"modified": "2018-09-17T05:23:58.000Z",
"description": "Payload delivery",
"pattern": "[domain-name:value = 'rollboat.tk']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:23:58Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"domain\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--5b9f3a82-435c-4cdd-9fd3-4685950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:24:18.000Z",
"modified": "2018-09-17T05:24:18.000Z",
"first_observed": "2018-09-17T05:24:18Z",
"last_observed": "2018-09-17T05:24:18Z",
"number_observed": 1,
"object_refs": [
"network-traffic--5b9f3a82-435c-4cdd-9fd3-4685950d210f",
"ipv4-addr--5b9f3a82-435c-4cdd-9fd3-4685950d210f"
],
"labels": [
"misp:type=\"ip-src\"",
"misp:category=\"Network activity\""
]
},
{
"type": "network-traffic",
"spec_version": "2.1",
"id": "network-traffic--5b9f3a82-435c-4cdd-9fd3-4685950d210f",
"src_ref": "ipv4-addr--5b9f3a82-435c-4cdd-9fd3-4685950d210f",
"protocols": [
"tcp"
]
},
{
"type": "ipv4-addr",
"spec_version": "2.1",
"id": "ipv4-addr--5b9f3a82-435c-4cdd-9fd3-4685950d210f",
"value": "89.40.14.229"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3aa6-a274-4e40-b424-030e950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:24:54.000Z",
"modified": "2018-09-17T05:24:54.000Z",
"description": "kc.exe",
"pattern": "[file:hashes.MD5 = '02b6f049f4d8246ee982d8c34a160311']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:24:54Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3ac3-3b24-4b5d-81d9-389a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:25:23.000Z",
"modified": "2018-09-17T05:25:23.000Z",
"description": "kc.exe",
"pattern": "[file:hashes.MD5 = '736de7cd6a9c76bd7df49e6b3df6000e']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:25:23Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3ac4-a598-44eb-a781-389a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:25:24.000Z",
"modified": "2018-09-17T05:25:24.000Z",
"description": "kc.exe",
"pattern": "[file:hashes.SHA1 = '1315994222d45410c8508cf614378e35c4f56c94']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:25:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--5b9f3ae0-18c8-4bc4-add5-389a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:25:52.000Z",
"modified": "2018-09-17T05:25:52.000Z",
"pattern": "[url:value = 'rollboat.tk/new']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:25:52Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Network activity"
}
],
"labels": [
"misp:type=\"url\"",
"misp:category=\"Network activity\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--89ea32c5-8ed1-4a5d-b6eb-81b304692175",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:22.000Z",
"modified": "2018-09-17T05:26:22.000Z",
"pattern": "[file:hashes.MD5 = '0fa8876252c632b64afad8fd7fa6344f' AND file:hashes.SHA1 = 'ab372d169743758bb81abaa4bc303d5303f6d913' AND file:hashes.SHA256 = 'aff30dd46fdbfa278e95e5958d1dd7ff0e525e5e4d3dc2b214a6ed267f27184f']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:26:22Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--d61a6111-686f-48d9-aa71-670e4ad3af92",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:20.000Z",
"modified": "2018-09-17T05:26:20.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-09-17T01:18:34",
"category": "Other",
"uuid": "3197363d-d391-4900-bee2-e2878d91c00c"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/aff30dd46fdbfa278e95e5958d1dd7ff0e525e5e4d3dc2b214a6ed267f27184f/analysis/1537147114/",
"category": "External analysis",
"uuid": "c1c04a0a-af3e-450c-8b7c-400d1dcffd7b"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "21/66",
"category": "Other",
"uuid": "f921dfe5-7e4b-4602-b3b6-360716995d38"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--41249430-fd98-43d4-8b38-f483450a56e4",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:24.000Z",
"modified": "2018-09-17T05:26:24.000Z",
"pattern": "[file:hashes.MD5 = 'f321b38b171a3cbc1eff4a41ac5bbe47' AND file:hashes.SHA1 = 'da61f88e2e95a23e58d96cf845c523fd10023cb7' AND file:hashes.SHA256 = '107e57389903e3ea717845570a9e68174cfff86f70ebfa5f0023236eb1fb3d46']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:26:24Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--600366d9-9b77-418e-afcb-d68d3e6c4f5a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:23.000Z",
"modified": "2018-09-17T05:26:23.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-09-13T00:29:32",
"category": "Other",
"uuid": "7c08ff39-894e-4007-925d-6085cfb8d259"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/107e57389903e3ea717845570a9e68174cfff86f70ebfa5f0023236eb1fb3d46/analysis/1536798572/",
"category": "External analysis",
"uuid": "0430321e-799d-4c3f-80ba-02bf62f9d100"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "44/68",
"category": "Other",
"uuid": "fe44287a-28d0-4274-8318-00baac491602"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--04e56925-da33-4e08-b9a0-9779b75b573d",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:27.000Z",
"modified": "2018-09-17T05:26:27.000Z",
"pattern": "[file:hashes.MD5 = '736de7cd6a9c76bd7df49e6b3df6000e' AND file:hashes.SHA1 = '1315994222d45410c8508cf614378e35c4f56c94' AND file:hashes.SHA256 = '4a274d49ff47697d3098cf73a05e3c7ccb323f2a57b5865fa2f924a22f13f9d0']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:26:27Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--4d83c4be-5177-4d47-93b9-b31795bbe3af",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:25.000Z",
"modified": "2018-09-17T05:26:25.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-09-13T12:10:02",
"category": "Other",
"uuid": "85d9ef1c-07e5-47f1-8792-3717ef47f092"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/4a274d49ff47697d3098cf73a05e3c7ccb323f2a57b5865fa2f924a22f13f9d0/analysis/1536840602/",
"category": "External analysis",
"uuid": "48a52550-d950-4b6e-b2db-cadf09a55bf9"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "29/59",
"category": "Other",
"uuid": "bef3c88a-01eb-43d2-b1e8-1531de455a0b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--b74ed736-91e3-4f21-a403-56d5e9b898e6",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:29.000Z",
"modified": "2018-09-17T05:26:29.000Z",
"pattern": "[file:hashes.MD5 = '57b430ea422d1f33fef19f02fb85c7f0' AND file:hashes.SHA1 = '60a64400207fd9835899189aa0c3cbca027fe8cf' AND file:hashes.SHA256 = '1c1e473d385b1c258f15d344ac5856fe88df88b1c477d9d8300e2981bb762525']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:26:29Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--5b126f66-2005-4273-b502-1ece9c0c273e",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:28.000Z",
"modified": "2018-09-17T05:26:28.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-09-13T06:39:02",
"category": "Other",
"uuid": "1558c0de-5432-4951-85c8-e1c34c691cf0"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/1c1e473d385b1c258f15d344ac5856fe88df88b1c477d9d8300e2981bb762525/analysis/1536820742/",
"category": "External analysis",
"uuid": "1dfde30c-fe74-49b7-b8aa-86d6aba5b50b"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "34/68",
"category": "Other",
"uuid": "109de2e8-534c-41f5-8d3c-c6d86203b18b"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--e377a0f7-f82e-4ee3-90d0-8404af82b73a",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:31.000Z",
"modified": "2018-09-17T05:26:31.000Z",
"pattern": "[file:hashes.MD5 = '02b6f049f4d8246ee982d8c34a160311' AND file:hashes.SHA1 = '088ed5abd0edda72a846ddcec24fceeafe394188' AND file:hashes.SHA256 = 'a7aae83573aa9a682ce9733468882e841564f41ec4aa004cb795b98fd4834d15']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:26:31Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--2301b7c2-06a6-4778-a34f-919a1896a278",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:30.000Z",
"modified": "2018-09-17T05:26:30.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-09-16T00:10:47",
"category": "Other",
"uuid": "b9f4be59-77d6-4f98-beb7-396b3e59bc3a"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/a7aae83573aa9a682ce9733468882e841564f41ec4aa004cb795b98fd4834d15/analysis/1537056647/",
"category": "External analysis",
"uuid": "830a2370-da92-408f-822b-5654b57782e4"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "33/59",
"category": "Other",
"uuid": "a37788dd-7086-4358-8478-e216fc028a08"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--d32dd9f0-12c0-44c0-8e3e-4cf0bc236a2c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:34.000Z",
"modified": "2018-09-17T05:26:34.000Z",
"pattern": "[file:hashes.MD5 = '1261b8382cfa2b905f0f52a3aef49ce4' AND file:hashes.SHA1 = 'e80c07f700cf817a1eca1f8186f820492f8a2fbc' AND file:hashes.SHA256 = '7b75837021f0271da96082239bd1ab650a5391919da7decc93ca03a7ae51899d']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2018-09-17T05:26:34Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "file"
}
],
"labels": [
"misp:name=\"file\"",
"misp:meta-category=\"file\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-object",
"spec_version": "2.1",
"id": "x-misp-object--260c7a64-d633-49a2-84de-1dcdabaf419c",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2018-09-17T05:26:32.000Z",
"modified": "2018-09-17T05:26:32.000Z",
"labels": [
"misp:name=\"virustotal-report\"",
"misp:meta-category=\"misc\""
],
"x_misp_attributes": [
{
"type": "datetime",
"object_relation": "last-submission",
"value": "2018-09-17T01:11:37",
"category": "Other",
"uuid": "279db2a1-f030-41a7-90a5-815bc730f887"
},
{
"type": "link",
"object_relation": "permalink",
"value": "https://www.virustotal.com/file/7b75837021f0271da96082239bd1ab650a5391919da7decc93ca03a7ae51899d/analysis/1537146697/",
"category": "External analysis",
"uuid": "365e4a3a-871b-48df-8f58-501ce05f45cb"
},
{
"type": "text",
"object_relation": "detection-ratio",
"value": "14/67",
"category": "Other",
"uuid": "1231e817-ea81-4f5f-b239-bc07aec47332"
}
],
"x_misp_meta_category": "misc",
"x_misp_name": "virustotal-report"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--b46d34c3-3436-44c0-9748-29de055d7ee8",
"created": "2018-09-17T05:26:33.000Z",
"modified": "2018-09-17T05:26:33.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--89ea32c5-8ed1-4a5d-b6eb-81b304692175",
"target_ref": "x-misp-object--d61a6111-686f-48d9-aa71-670e4ad3af92"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--30fd1243-640c-449a-a8f3-c9af64ae0b9f",
"created": "2018-09-17T05:26:33.000Z",
"modified": "2018-09-17T05:26:33.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--41249430-fd98-43d4-8b38-f483450a56e4",
"target_ref": "x-misp-object--600366d9-9b77-418e-afcb-d68d3e6c4f5a"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--6673d173-d99b-49e3-bb88-389c4fa098b9",
"created": "2018-09-17T05:26:33.000Z",
"modified": "2018-09-17T05:26:33.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--04e56925-da33-4e08-b9a0-9779b75b573d",
"target_ref": "x-misp-object--4d83c4be-5177-4d47-93b9-b31795bbe3af"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--92e90c02-7930-49a6-a165-c4ae41bb7c5b",
"created": "2018-09-17T05:26:33.000Z",
"modified": "2018-09-17T05:26:33.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--b74ed736-91e3-4f21-a403-56d5e9b898e6",
"target_ref": "x-misp-object--5b126f66-2005-4273-b502-1ece9c0c273e"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--8302089c-1dbf-412d-ab67-f38ec442c1f1",
"created": "2018-09-17T05:26:33.000Z",
"modified": "2018-09-17T05:26:33.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--e377a0f7-f82e-4ee3-90d0-8404af82b73a",
"target_ref": "x-misp-object--2301b7c2-06a6-4778-a34f-919a1896a278"
},
{
"type": "relationship",
"spec_version": "2.1",
"id": "relationship--e1d794b1-1714-4370-be04-226021fc9727",
"created": "2018-09-17T05:26:33.000Z",
"modified": "2018-09-17T05:26:33.000Z",
"relationship_type": "analysed-with",
"source_ref": "indicator--d32dd9f0-12c0-44c0-8e3e-4cf0bc236a2c",
"target_ref": "x-misp-object--260c7a64-d633-49a2-84de-1dcdabaf419c"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}